PassPoints : Design and Evaluation of a Graphical Password System
暂无分享,去创建一个
Susan Wiedenbeck | Nasir Memon | Jean-Camille Birget | S. Wiedenbeck | N. Memon | J. Birget | J. Waters | Alex Broditskiy | Jim Waters | Alex Broditskiy
[1] Andrew S. Patrick,et al. HCI and security systems , 2003, CHI Extended Abstracts.
[2] J. Rall. Why Things Bite Back: Technology and the Revenge of Unintended Consequences. , 1997 .
[3] J. Wixted,et al. On the Form of Forgetting , 1991 .
[4] Antonella De Angeli,et al. VIP: a visual approach to user authentication , 2002, AVI '02.
[5] Michael K. Reiter,et al. On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.
[6] Jeff A. Johnson,et al. Interacting with identification technology: can it make us more secure? , 2002, CHI Extended Abstracts.
[7] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[8] D. Rundus. Analysis of rehearsal processes in free recall. , 1971 .
[9] P. Fitts. The information capacity of the human motor system in controlling the amplitude of movement. , 1954, Journal of experimental psychology.
[10] G. Ritchey,et al. Long-Term Memory for Pictures , 2005 .
[11] David C. Feldmeier,et al. UNIX Password Security - Ten Years Later , 1989, CRYPTO.
[12] M. Bradley,et al. Remembering pictures: pleasure and arousal in memory. , 1992, Journal of experimental psychology. Learning, memory, and cognition.
[13] R. Shepard. Recognition memory for words, sentences, and pictures , 1967 .
[14] Daphna Weinshall,et al. Passwords you'll never forget, but can't recall , 2004, CHI EA '04.
[15] J. Henderson,et al. Accurate visual memory for previously attended objects in natural scenes , 2002 .
[16] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[17] F. Craik,et al. Levels of Pro-cessing: A Framework for Memory Research , 1975 .
[18] J. Wixted. The psychology and neuroscience of forgetting. , 2004, Annual review of psychology.
[19] Rachna Dhamija,et al. Hash visualization in user authentication , 2000, CHI Extended Abstracts.
[20] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[21] Colin Potts,et al. Design of Everyday Things , 1988 .
[22] A. Paivio,et al. Why are pictures easier to recall than words? , 1968 .
[23] L. Standing. Learning 10,000 pictures. , 1973, The Quarterly journal of experimental psychology.
[24] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[25] Antonella De Angeli,et al. Usability and biometric verification at the ATM interface , 2003, CHI '03.
[26] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[27] M. Angela Sasse,et al. Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.
[28] H. P. Bahrick. Semantic memory content in permastore: fifty years of memory for Spanish learned in school. , 1984, Journal of experimental psychology. General.
[29] Alan S. Brown,et al. Generating and remembering passwords , 2004 .
[30] I. Biederman,et al. Searching for objects in real-world scences. , 1973, Journal of experimental psychology.
[31] Nasir D. Memon,et al. Robust discretization, with an application to graphical passwords , 2003, IACR Cryptol. ePrint Arch..