Undercover: authentication usable in front of prying eyes
暂无分享,去创建一个
Nicolas Christin | Hirokazu Sasamoto | Eiji Hayashi | Nicolas Christin | Eiji Hayashi | Hirokazu Sasamoto
[1] David A. Wagner,et al. Cryptanalysis of a Cognitive Authentication Scheme , 2006, IACR Cryptol. ePrint Arch..
[2] Hans Colonius,et al. Visual-tactile spatial interaction in saccade generation , 2003, Experimental Brain Research.
[3] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[4] Dawei Hong,et al. A Shoulder-Surfing Resistant Graphical Password Scheme - WIW , 2003, Security and Management.
[5] Fiona Fui-Hoon Nah,et al. Web browsing and spyware intrusion , 2005, CACM.
[6] Nicolas Christin,et al. Mental Trapdoors for User Authentication on Small Mobile Devices , 2007 .
[7] Ehud Ahissar,et al. Importance of Temporal Cues for Tactile Spatial- Frequency Discrimination , 2001, The Journal of Neuroscience.
[8] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[9] C. Spence,et al. The Handbook of Multisensory Processing , 2004 .
[10] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[11] Volker Roth,et al. A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.
[12] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[13] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[14] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[15] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.
[16] B. Malek,et al. Novel Shoulder-Surfing Resistant Haptic-based Graphical Password , 2006 .
[17] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[18] David A. Wagner,et al. Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Simson L. Garfinkel,et al. Security and Usability , 2005 .
[20] T. Salthouse. The processing-speed theory of adult age differences in cognition. , 1996, Psychological review.
[21] P J Blamey,et al. Speech perception using combinations of auditory, visual, and tactile information. , 1989, Journal of rehabilitation research and development.
[22] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[23] Tal Garfinkel,et al. Reducing shoulder-surfing by using gaze-based password entry , 2007, SOUPS '07.
[24] Daphna Weinshall,et al. Cognitive authentication schemes safe against spyware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[25] Wendy Moncur,et al. Pictures at the ATM: exploring the usability of multiple graphical passwords , 2007, CHI.