Communications of the ACM
Password security: a case history
Communications of the ACM
Mean Shift: A Robust Approach Toward Feature Space Analysis
IEEE Transactions on Pattern Analysis and Machine Intelligence
Usability and biometric verification at the ATM interface
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Automatic Identification of Perceptually Important Regions in an Image
ICPR '98 Proceedings of the 14th International Conference on Pattern Recognition-Volume 1 - Volume 1
Mean Shift Analysis and Applications
ICCV '99 Proceedings of the International Conference on Computer Vision-Volume 2 - Volume 2
Passwords you'll never forget, but can't recall
CHI '04 Extended Abstracts on Human Factors in Computing Systems
Towards Secure Design Choices for Implementing Graphical Passwords
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
A Remote User Authentication Scheme Using Strong Graphical Passwords
LCN '05 Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
On user choice in graphical password schemes
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Graphical passwords based on robust discretization
IEEE Transactions on Information Forensics and Security
Do background images improve "draw a secret" graphical passwords?
Proceedings of the 14th ACM conference on Computer and communications security
Order and entropy in picture passwords
GI '08 Proceedings of graphics interface 2008
Centered discretization with application to graphical passwords (full paper)
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Securing passfaces for description
Proceedings of the 4th symposium on Usable privacy and security
PassShapes: utilizing stroke based authentication to increase password memorability
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Influencing users towards better passwords: persuasive cued click-points
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1
Guidelines for designing graphical authentication mechanism interfaces
International Journal of Information and Computer Security
Multiple password interference in text passwords and click-based graphical passwords
Proceedings of the 16th ACM conference on Computer and communications security
The Impact of Image Choices on the Usability and Security of Click Based Graphical Passwords
ISVC '09 Proceedings of the 5th International Symposium on Advances in Visual Computing: Part II
Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The effect of baroque music on the PassPoints graphical password
Proceedings of the ACM International Conference on Image and Video Retrieval
A closer look at recognition-based graphical passwords on mobile devices
Proceedings of the Sixth Symposium on Usable Privacy and Security
Purely automated attacks on passpoints-style graphical passwords
IEEE Transactions on Information Forensics and Security
Exploring usability effects of increasing security in click-based graphical passwords
Proceedings of the 26th Annual Computer Security Applications Conference
MARASIM: a novel jigsaw based authentication scheme using tagging
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
On designing usable and secure recognition-based graphical authentication mechanisms
Interacting with Computers
Can background baroque music help to improve the memorability of graphical passwords?
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
WebTicket: account management using printable tokens
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Graphical password authentication using cued click points
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Evaluating the effect of user guidelines on creating click-draw based graphical passwords
Proceedings of the 2012 ACM Research in Applied Computation Symposium
NAPTune: fine tuning graphical authentication
Proceedings of the 3rd International Conference on Human Computer Interaction
On automated image choice for secure and usable graphical passwords
Proceedings of the 28th Annual Computer Security Applications Conference
Evaluating the effect of tolerance on click-draw based graphical password scheme
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Age-related performance issues for PIN and face-based authentication systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Time evolving graphical password for securing mobile devices
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Security implications of password discretization for click-based graphical passwords
Proceedings of the 22nd international conference on World Wide Web
Quantifying the security of graphical passwords: the case of android unlock patterns
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Faces and Pictures: Understanding age differences in two types of graphical authentications
International Journal of Human-Computer Studies
On the security of picture gesture authentication
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |
We develop a model to identify the most likely regions for users to click in order to create graphical passwords in the PassPoints system. A PassPoints password is a sequence of points, chosen by a user in an image that is displayed on the screen. Our model predicts probabilities of likely click points; this enables us to predict the entropy of a click point in a graphical password for a given image. The model allows us to evaluate automatically whether a given image is well suited for the PassPoints system, and to analyze possible dictionary attacks against the system. We compare the predictions provided by our model to results of experiments involving human users. At this stage, our model and the experiments are small and limited; but they show that user choice can be modeled and that expansions of the model and the experiments are a promising direction of research.