PhorceField: a phish-proof password ceremony
暂无分享,去创建一个
[1] Susan Wiedenbeck,et al. Authentication Using Graphical Passwords: Basic Results , 2005 .
[2] N. Sangeetha,et al. AUTHENTICATING MOBILE DEVICE USERS THROUGH IMAGE SELECTION , 2013 .
[3] David A. Wagner,et al. Conditioned-safe ceremonies and a user study of an application to web authentication , 2009, NDSS.
[4] L.D. Paulson. Taking a graphical approach to the password , 2002, Computer.
[5] J. Kase. Graphical Passwords , 2008 .
[6] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[7] Wendy Moncur,et al. Pictures at the ATM: exploring the usability of multiple graphical passwords , 2007, CHI.
[8] Michael C. Anderson,et al. Interference and inhibition in memory retrieval. , 1996 .
[9] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[10] Robert A. Bjork,et al. Memory: Handbook of Perception and Cognition , 1996 .
[11] J. Eng,et al. Sample Size Estimation : How Many Individuals Should Be Studied ? , 2022 .
[12] Lorrie Faith Cranor,et al. Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.
[13] K. Dahal,et al. Intelligent Phishing Website Detection System using Fuzzy Techniques , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
[14] T. Carr,et al. Memory for words, pictures, and faces: Retroactive interference, forgetting, and reminiscence. , 1981 .
[15] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[16] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[17] Tal Garfinkel,et al. Reducing shoulder-surfing by using gaze-based password entry , 2007, SOUPS '07.
[18] P. N. JOHNSON-LAIRD,et al. Memory for words , 1974, Nature.
[19] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[20] Tyler Moore,et al. An Empirical Analysis of the Current State of Phishing Attack and Defence , 2007, WEIS.
[21] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[22] Yue Wang,et al. Light Weight Anti-Phishing with User Whitelisting in a Web Browser , 2008, 2008 IEEE Region 5 Conference.
[23] Robert Biddle,et al. A Usability Study and Critique of Two Password Managers , 2006, USENIX Security Symposium.
[24] Suku Nair,et al. A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.
[25] Susan T. Dumais,et al. A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.
[26] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[27] W. Jansen,et al. Authenticating Mobile Device UsersThrough Image Selection , 2004 .
[28] Daphna Weinshall,et al. Passwords you'll never forget, but can't recall , 2004, CHI EA '04.
[29] Vibha Sazawal,et al. Doodling our way to better authentication , 2002, CHI Extended Abstracts.