参考文献
|
-
Al-Husainy, M. A. F.,Malih, R. A.(2015).Using Emoji Poctures to Strengthen The Immunity of Passwords Against Attackers.European Scientific Journal,11(30),153-165.
-
Alomar, N.,Alsaleh, M.,Alarifi, A.(2017).Someone in Your Contact List: Cued Recall-Based Textual Passwords.IEEE Transactions on Information Forensics and Security,12(11),2574-2589.
-
Bianchi, A.,Oakley, I.,Kostakos, V.,Kwon, D. S.(2011).The Phone Lock: Audio and Haptic ShoulderSurfing Resistant PIN Entry Methods for Mobile Devices.Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, Funchal, Madeira, Portugal, 22-26 Jan 2011,New York, USA:
-
Bianchi, A.,Oakley, I.,Kwon, D. S.(2010).The Secure Haptic Keypad: a Tactile Password System.Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA, 10-15 Apr 2010,New York:
-
Biddle, R.,Chiasson, S.,Van Oorschot, P. C.(2012).Graphical Passwords: Learning from the First Twelve Years.ACM Computing Surveys (CSUR),44(4),1-25.
-
Gokhale, A. S.,Waghmare, V. S.(2016).The Shoulder Surfing Resistant Graphical Password Authentication Technique.Procedia Computer Science,79,490-498.
-
Ho, P. F.,Kam, Y. H.-S.,Wee, M. C.,Chong, Y. N.,Por, L. Y.(2014).Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ information.The Scientific World Journal,2014,838623.
-
Istyaq, S.,Agrawal, L.(2016).A New Technique For User Authentication Using Numeric One Time Password Scheme.International Journal of Advanced Trends in Computer Science and Engineering,4(5),163-165.
-
Kaur, R.,Kaur, A.(2015).Multi-Factor Graphical Password for Cloud Interface Authentication Security.International Journal of Computer Applications,125(7),32-35.
-
Khodadadi, T.,Islam, A. M.,Baharun, S.,Komaki, S.(2016).Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes.International Journal of Electrical and Computer Engineering,6(6),2939-2948.
-
Kita, Y.,Sugai, F.,Park, M.,Okazaki, N.(2013).Proposal and Its Evaluation of A Shoulder-Surfing Attack Resistant Authentication Method: Secret Tap with Double Shift.International Journal of Cyber-Security and Digital Forensics,2(1),48-55.
-
Kumar, M.,Garfinkel, T.,Boneh, D.,Winograd, T.(2007).Reducing Shoulder-Surfing by Using Gaze-Based Password Entry.Proceedings of the 3rd symposium on Usable privacy and security, Pittsburgh, Pennsylvania, USA, 18-20 Jul 2007,New York, USA:
-
Kwon, T.,Hong, J.(2015).Analysis and Improvement of A Pin-Entry Method Resilient to Shoulder-Surfing and Recording Attacks.IEEE Transactions on Information Forensics and Security,10(2),278-292.
-
Kwon, T.,Shin, S.,Na, S.(2014).Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected.IEEE Trans. Systems, Man, and Cybernetics: Systems,44(6),716-727.
-
Narayanan, A.,Shmatikov, V.(2005).Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff.Proceedings of the 12th ACM conference on Computer and communications security, Alexandria, VA, USA, 7-11 Nov 2005,New York, USA:
-
Nurul, K. U.,Nugroho, L. E.,Adhipta, D.(2015).Shoulder Surfing Resistant Text Based Graphical Password Schemes Using Color.International Conference on Science, Technology and Humanity 2015
-
Rittenhouse, R. G.,Chaudry, J. A.,Lee, M.(2013).Security in Graphical Authentication.International Journal of Security and Its Applications,7(3),347-356.
-
Schaub, F.,Deyhle, R.,Weber, M.(2012).Password Entry Usability and Shoulder Surfing Susceptibility on Different Smartphone Platforms.Proceedings of the 11th international conference on mobile and ubiquitous multimedia, Ulm, Germary, 4-6 Dec 2012,New York, USA:
-
Sun, H. M.,Chen, S. T.,Yeh, J. H.,Cheng, C. Y.(2016).A Shoulder Surfing Resistant Graphical Authentication System.IEEE Transactions on Dependable and Secure Computing,15(2),180-193.
-
Suo, X.,Zhu, Y.,Owen, G. S.(2005).Graphical Passwords: A Survey.IEEE proceedings of 21st annual Computer security applications conference, Tucson, AZ, USA, 5-9 Dec 2005,Washington, DC:
-
Ur, B.,Kelley, P. G.,Komanduri, S.,Lee, J.,Maass, M.,Mazurek, M. L.,Passaro, T.(2012).How does your password measure up? The effect of strength meters on password creation.annual meeting for the USENIX Security Symposium,Bellevue:
-
Vachaspati, P.,Chakravarthy, A.,Avadhani, P.(2013).A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords.International Journal of Computer Applications,71(10),42-54.
-
Von Zezschwitz, E.,De Luca, A.,Hussmann, H.(2014).Honey, I Shrunk the Keys: Influences of Mobile Devices on Password Composition and Authentication Performance.Proceedings of the 8th nordic conference on human-computer interaction: fun, fast, foundational, Helsinki, Finland, 26-30 Oct 2014,New York, USA:
-
Weinshall, D.(2006).Cognitive Authentication Schemes Safe Against Spyware.IEEE Proceedings of Symposium on Security and Privacy, Berkeley/Oakland, CA, USA, 21-24 May 2006,Washington, DC:
-
Yeung, A. L. C.,Wai, B. L. W.,Fung, C. H.,Mughal, F.,Iranmanesh, V.(2015).Graphical Password: ShoulderSurfing Resistant Using Falsification.IEEE Proceedings of 2015 9th Malaysian Software Engineering Conference (MySEC), Kuala Lumpur, Malaysia, 16-17 Dec 2015,Washington, DC:
|