A review of graphical authentication utilising a keypad input method

[1]  Suryakanth V. Gangashetty,et al.  Passblot: A Highly Scalable Graphical One Time Password System , 2012 .

[2]  Partha Pratim Ray,et al.  Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices , 2012 .

[3]  James Miller,et al.  Token-based graphical password authentication , 2011, International Journal of Information Security.

[4]  Suryakanth V. Gangashetty,et al.  Passblot: A Usable Way of Authentication Scheme to Generate One Time Passwords , 2011 .

[5]  Shashi Mogalla,et al.  A Well Known Tool Based Graphical Authentication Technique , 2011 .

[6]  M. Angela Sasse,et al.  Evaluating the usability and security of a graphical one-time PIN system , 2010, BCS HCI.

[7]  Ravi Kuber,et al.  Feasibility study of tactile-based authentication , 2010, Int. J. Hum. Comput. Stud..

[8]  Haichang Gao,et al.  A new graphical password scheme against spyware by using CAPTCHA , 2009, SOUPS.

[9]  Issues Threats and Future Trend for Gsp Issues, Threats and Future Trend for GSP , 2008 .

[10]  Carol Alexander Two factor authentication that doesn’t use chips , 2008 .

[11]  Mukesh Singhal,et al.  Password-Based Authentication: Preventing Dictionary Attacks , 2007, Computer.

[12]  Nasir D. Memon,et al.  PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..

[13]  Antonella De Angeli,et al.  Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems , 2005, Int. J. Hum. Comput. Stud..

[14]  Dawei Hong,et al.  A Graphical Password Scheme Strongly Resistant to Spyware , 2004, Security and Management.

[15]  Dawei Hong,et al.  A Shoulder-Surfing Resistant Graphical Password Scheme - WIW , 2003, Security and Management.

[16]  Benny Pinkas,et al.  Securing passwords against dictionary attacks , 2002, CCS '02.

[17]  Nick Feamster,et al.  Dos and don'ts of client authentication on the web , 2001 .

[18]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[19]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[20]  R. Haber,et al.  Perception and memory for pictures: Single-trial learning of 2500 visual stimuli , 1970 .