Advances in User Authentication
暂无分享,去创建一个
[1] Nasir D. Memon,et al. Robust discretization, with an application to graphical passwords , 2003, IACR Cryptol. ePrint Arch..
[2] Dawn Xiaodong Song,et al. The Emperor's New Password Manager: Security Analysis of Web-based Password Managers , 2014, USENIX Security Symposium.
[3] James K. Mullin. A second look at bloom filters , 1983, CACM.
[4] Steffen Werner,et al. Password Entry Times for Recognition-based Graphical Passwords , 2016 .
[5] Claude Castelluccia,et al. Adaptive Password-Strength Meters from Markov Models , 2012, NDSS.
[6] George Varghese,et al. An Improved Construction for Counting Bloom Filters , 2006, ESA.
[7] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[8] Dan Boneh,et al. Kamouflage: Loss-Resistant Password Management , 2010, ESORICS.
[9] Michael K. Reiter,et al. On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.
[10] L.D. Paulson. Taking a graphical approach to the password , 2002, Computer.
[11] Wayne A. Jansen,et al. Authenticating Users on Handheld Devices , 2003 .
[12] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[13] Sachin Agarwal,et al. Approximating the number of differences between remote sets , 2006, 2006 IEEE Information Theory Workshop - ITW '06 Punta del Este.
[14] Susan Wiedenbeck,et al. Authentication Using Graphical Passwords: Basic Results , 2005 .
[15] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[16] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.
[17] Douglas N. Hoover,et al. Software smart cards via cryptographic camouflage , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[18] Richard P. Ayers,et al. Picture Password: A Visual Login Technique for Mobile Devices , 2003 .
[19] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[20] N. Sangeetha,et al. AUTHENTICATING MOBILE DEVICE USERS THROUGH IMAGE SELECTION , 2013 .
[21] Dawn Song,et al. Hash Visualization: a New Technique to improve Real-World Security , 1999 .
[22] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[23] Julie Thorpe,et al. Graphical Dictionaries and the Memorable Space of Graphical Passwords , 2004, USENIX Security Symposium.
[24] Dawei Hong,et al. A Shoulder-Surfing Resistant Graphical Password Scheme - WIW , 2003, Security and Management.
[25] Eric Klieme,et al. Poster : Towards Continuous Authentication Based On Mobile Messaging App Usage , 2014 .
[26] Fan Deng,et al. Approximately detecting duplicates for streaming data using stable bloom filters , 2006, SIGMOD Conference.
[27] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[28] Marc Stevens,et al. New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis , 2013, EUROCRYPT.
[29] Vir V. Phoha,et al. Scan-Based Evaluation of Continuous Keystroke Authentication Systems , 2013, IT Professional.
[30] Martin M. A. Devillers. Analyzing Password Strength , 2010 .
[31] M Sreelatha,et al. Authentication Schemes for Session Passwords using Color and Images , 2011 .
[32] Thomas Ristenpart,et al. Honey Encryption: Encryption beyond the Brute-Force Barrier , 2014, IEEE Security & Privacy.
[33] Dimitriadis Evangelos,et al. The Quest to Replace Passwords : a Framework for Comparative Evaluation of Web Authentication Schemes , 2016 .
[34] Li-Tung Weng,et al. Graphical Passwords Using Images with Random Tracks of Geometric Shapes , 2008, 2008 Congress on Image and Signal Processing.
[35] Lujo Bauer,et al. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms , 2011, 2012 IEEE Symposium on Security and Privacy.
[36] Rajesh Kumar,et al. Context-Aware Active Authentication Using Smartphone Accelerometer Measurements , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[37] Ninghui Li,et al. A Study of Probabilistic Password Models , 2014, 2014 IEEE Symposium on Security and Privacy.
[38] S. Akula,et al. Image Based Registration and Authentication System , 2004 .
[39] Julie Thorpe,et al. Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.
[40] Andreas P. Heiner,et al. A closer look at recognition-based graphical passwords on mobile devices , 2010, SOUPS.
[41] Nasir D. Memon,et al. Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.
[42] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[43] Julie Thorpe,et al. Analyzing User Choice in Graphical Passwords , 2004 .
[44] Thomas Ristenpart,et al. Cracking-Resistant Password Vaults Using Natural Language Encoders , 2015, 2015 IEEE Symposium on Security and Privacy.
[45] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[46] Vibha Sazawal,et al. Doodling our way to better authentication , 2002, CHI Extended Abstracts.
[47] Hideki Koike,et al. Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images , 2003, Mobile HCI.
[48] Eugene H. Spafford,et al. OPUS: Preventing weak password choices , 1992, Comput. Secur..
[49] Ronald L. Rivest,et al. Honeywords: making password-cracking detectable , 2013, CCS.
[50] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[51] Eiji Okamoto,et al. A User Identification System Using Signature Written with Mouse , 1998, ACISP.