Pictures at the ATM: exploring the usability of multiple graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A second look at the usability of click-based graphical passwords
Proceedings of the 3rd symposium on Usable privacy and security
Reducing shoulder-surfing by using gaze-based password entry
Proceedings of the 3rd symposium on Usable privacy and security
Modeling user choice in the PassPoints graphical password scheme
Proceedings of the 3rd symposium on Usable privacy and security
On predictive models and user-drawn graphical passwords
ACM Transactions on Information and System Security (TISSEC)
Do background images improve "draw a secret" graphical passwords?
Proceedings of the 14th ACM conference on Computer and communications security
Human-seeded attacks and exploiting hot-spots in graphical passwords
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Provably secure browser-based user-aware mutual authentication over TLS
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Centered discretization with application to graphical passwords (full paper)
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Securing passfaces for description
Proceedings of the 4th symposium on Usable privacy and security
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Can "Something You Know" Be Saved?
ISC '08 Proceedings of the 11th international conference on Information Security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
A user friendly password authenticated key agreement for multi server environment
Proceedings of the International Conference on Advances in Computing, Communication and Control
Influencing users towards better passwords: persuasive cued click-points
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1
A random cursor matrix to hide graphical password input
SIGGRAPH '09: Posters
Multiple password interference in text passwords and click-based graphical passwords
Proceedings of the 16th ACM conference on Computer and communications security
The Impact of Image Choices on the Usability and Security of Click Based Graphical Passwords
ISVC '09 Proceedings of the 5th International Symposium on Advances in Visual Computing: Part II
Graphical passwords: drawing a secret with rotation as a new degree of freedom
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Multi-touch authentication on tabletops
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usability and strength in click-based graphical passwords
CHI '10 Extended Abstracts on Human Factors in Computing Systems
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
PassPattern system (PPS): a pattern-based user authentication scheme
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
The effect of baroque music on the PassPoints graphical password
Proceedings of the ACM International Conference on Image and Video Retrieval
A closer look at recognition-based graphical passwords on mobile devices
Proceedings of the Sixth Symposium on Usable Privacy and Security
A security class project in graphical passwords
Journal of Computing Sciences in Colleges
Purely automated attacks on passpoints-style graphical passwords
IEEE Transactions on Information Forensics and Security
Exploring usability effects of increasing security in click-based graphical passwords
Proceedings of the 26th Annual Computer Security Applications Conference
Soft biometric traits for continuous user authentication
IEEE Transactions on Information Forensics and Security
A new shoulder-surfing resistant password for mobile environments
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Exploration of a hand-based graphical password scheme
Proceedings of the 4th international conference on Security of information and networks
A hybrid graphical password based system
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
PhorceField: a phish-proof password ceremony
Proceedings of the 27th Annual Computer Security Applications Conference
Shoulder surfing defence for recall-based graphical passwords
Proceedings of the Seventh Symposium on Usable Privacy and Security
Analysis and design of graphical password techniques
ISVC'06 Proceedings of the Second international conference on Advances in Visual Computing - Volume Part II
On the security of a two-factor authentication scheme
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
BroAuth: evaluating different levels of visual feedback for 3D gesture-based authentication
Proceedings of the International Working Conference on Advanced Visual Interfaces
Tag association based graphical password using image feature matching
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part II
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Do you see your password?: applying recognition to textual passwords
Proceedings of the Eighth Symposium on Usable Privacy and Security
An enhanced drawing reproduction graphical password strategy
Journal of Computer Science and Technology - Special issue on Natural Language Processing
PassChords: secure multi-touch authentication for blind people
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Graphical password authentication using cued click points
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Evaluating the effect of user guidelines on creating click-draw based graphical passwords
Proceedings of the 2012 ACM Research in Applied Computation Symposium
ALERT-ID: analyze logs of the network element in real time for intrusion detection
RAID'12 Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses
On automated image choice for secure and usable graphical passwords
Proceedings of the 28th Annual Computer Security Applications Conference
A versatile access control implementation: secure box
Proceedings of the 18th ACM symposium on Access control models and technologies
Time evolving graphical password for securing mobile devices
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
ACM Transactions on Accessible Computing (TACCESS)
Exploring capturable everyday memory for autobiographical authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Exploring the design space of graphical passwords on smartphones
Proceedings of the Ninth Symposium on Usable Privacy and Security
POSTER: Graphical password using object-based image ranking
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Faces and Pictures: Understanding age differences in two types of graphical authentications
International Journal of Human-Computer Studies
On the security of picture gesture authentication
SEC'13 Proceedings of the 22nd USENIX conference on Security
Expert Systems with Applications: An International Journal
Runtime adaptive multi-factor authentication for mobile devices
IBM Journal of Research and Development
Hi-index | 0.00 |
When will we be secure? Nobody knows for surebut it cannot happen before commercial security products and services possess not only enough functionality to satisfy customers' stated needs, but also sufficient assurance of quality, reliability, safety, ...