Using avatars for improved authentication with challenge questions
暂无分享,去创建一个
[1] A. Baddeley. Essentials of Human Memory , 1999 .
[2] Pamela Briggs,et al. Biometric daemons: authentication via electronic pets , 2008, UPSEC.
[3] Eugene H. Spafford,et al. Observing Reusable Password Choices , 1992 .
[4] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[5] Michael K. Reiter,et al. The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.
[6] Mike Just,et al. Personal choice and challenge questions: a security and usability assessment , 2009, SOUPS.
[7] Ariel Rabkin,et al. Personal knowledge questions for fallback authentication: security questions in the era of Facebook , 2008, SOUPS '08.
[8] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[9] Joseph Bonneau,et al. What ’ s in a Name ? Evaluating Statistical Attacks on Personal Knowledge Questions , 2010 .
[10] Robert Biddle,et al. User Study, Analysis, and Usable Security of Passwords Based on Digital Objects , 2011, IEEE Transactions on Information Forensics and Security.
[11] N. Yee,et al. The psychology of massively multi-user online role-playing games: Motivations , 2005 .
[12] Serge Egelman,et al. It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[13] N. Yee. The Psychology of Massively Multi-User Online Role-Playing Games: Motivations, Emotional Investment, Relationships and Problematic Usage , 2005 .
[14] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.