Communications of the ACM
Hash visualization in user authentication
CHI '00 Extended Abstracts on Human Factors in Computing Systems
A User Identification System Using Signature Written with Mouse
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Design and evaluation of a shoulder-surfing resistant graphical password scheme
Proceedings of the working conference on Advanced visual interfaces
On user choice in graphical password schemes
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Hi-index | 0.01 |
In recent years, graphical passwords have become a viable alternative to the traditional text-based passwords due to their superior ease of recall and potential large password space. However, there is very limited research in classifying and mathematically analyzing the graphical password techniques. In this paper, we conduct a comprehensive study of the existing graphical password techniques. We propose the first taxonomy for graphical passwords methods and discuss the important elements in designing them. We present a mathematical analysis of the graphical password space. Finally we present a new graphical password scheme.