参考文献
|
-
The Science Behind Passfaces, Real User Corporation. (2001). Retrieved November 30, 2011, from the World Wide Web: http://www.realuser.com/published/ScienceBehindPassfaces.pdf
-
(1983).Imagery, memory and cognition.
-
Visual key-Technology, sfr GmbH. (2000). Retrieved November 30, 2011. from the World Wide Web: http://www.viskey.com/tech.html
-
Blonder, G.E. (1996). Graphical Passwords. United States Patent 5559961.
-
Kirkpatrick, E.A. (1894). An Experimental Study of Memory. Psychological Review, 1(6), 602-609
-
Pointsec for Pocket PC, Pointsec Mobile Technologies. (2002). Retrieved November 30, 2011, from the World Wide Web: http://www.pointsec.com
-
Sobrado, L., & Birget, J.C. (2005). Shoulder-Surfing Resistant raphical Passwords ─ Draft. Retrieved April 14, 2005, from the World Wide Web: http://clam.rutgers.edu/~birget/grPssw/srgp.pdf
-
Calkins, M.W. (1898). Short Studies in Memory and Association. Psychological Review, 5, 451-462
-
Passlogix. Retrieved November 30, 2011, from the World Wide Web: http://www.passlogix.com
-
GrIDsure. (2007). Comments on Gridsure Authentication. Retrieved November 30, 2011, from the World Wide Web: http://www.gridsure.com
-
Alsulaiman, F.,Saddik, A.E.(2008).Three-Dimensional Password for More Secure Authentication.IEEE Transactions on Instrumentation and Measurement,57,1929-1938.
-
Angeli, A.D.,Coutts, M.,Coventry, L.,Johnson, G.I.(2002).VIP: A Visual Approach to User Authentication.Proceeding of the Wording Conference on Advanced Visual Interfaces
-
Angeli, A.D.,Coventry, L.,Johnson, G.I.,Coutts, M.(2003).Usability and User Authentication: Pictorial Passwords vs. PIN.Contemporary Ergonomics,London:
-
Davis, D.,Monrose, F.,Reiter, M.K.(2004).On User Choice in Graphical Password Schemes.Proceedings of the 13th USENIX Security Symposium,San Diego:
-
Dhamija, R.(2000).Hash Visualization in User Authentication.Proceedings of the 2000 International Conference on Human Factors in Computing Systems
-
Dhamija, R.,Perrig, A.(2000).Déjà Vu: a User Study Using Images for Authentication.Proceedings of the 9th USENIX Security Symposium
-
Duncan, M.V.,Akhtari, M.S.,Bradford, P.G.(2004).Visual Security for Wireless Handheld Devices.The Journal of Science & Health at the University of Alabama,2
-
Farmand, S.,Zakaria, O.B.(2010).Improving Password Graphical Resistant to Shoulder-Surfing Using 4-Way Recognition-Based Sequence Reproduction.Proceedings of the 2nd IEEE International Conference
-
Gao, H.,Liu, X.,Wang, S.,Dai, R.(2009).A New Graphical Password Scheme Against Spyware by Using CAPTCHA.Proceedings of the 2009 Symposium on Usable Privacy and Security 2009,Mountain View, CA, USA:
-
Gao, H.,Liu, X.,Wang, S.,Liu, H.,Dai, R.(2009).Design and Analysis of a Graphical Password Scheme.Proceedings of the Fourth International Conference on Innovative Computing, Information and Control,Kaohsiung, Taiwan:
-
Hartanto, B.,Santoso, B.,Welly, S.(2006).The Usage of Graphical Password as a Replacement to the Alphanumerical Password.Journal of Informatika,7(2),91-97.
-
Hoanca, B.,Mock, K.(2005).Screen Oriented Technique for Reducing the Incidence of Shoulder Surfing.Proceedings of the 2005 International Conference on Security and Management
-
Hoanca, B.,Mock, K.(2008).Password Entry Scheme Resistant to Eavesdropping.Proceedings of the 2008 International Conference on Security and Management,Las Vegas, NV:
-
Jansen, W.,Gavrila, S.,Korolev, V.,Ayers, R.,Swanstrom, R.(2003).National Institute of Standards and Technology Interagency ReportNational Institute of Standards and Technology Interagency Report,未出版
-
Jermyn, I.,Mayer, A.,Monrose, F.,Reiter, M.K.,Rubin, A.D.(1999).The Design and Analysis of Graphical Passwords.Proceedings of the 8th USENIX Security Symposium
-
Komanduri, S.,Hutchings, D.(2008).Order and Entropy in Picture Passwords.Proceedings of the 2008 Graphics Interface Conference
-
Lashkari, A.H.,Farmand, S.(2009).A Survey on Usability and Security Features in Graphical User Authentication Algorithms.International Journal of Computer Science and Network Security,9(9),195-204.
-
Lashkari, A.H.,Zakaria, O.B.,Farmand, S.,Saleh, R.(2009).Shoulder Surfing Attack in Graphical Password Authentication.International Journal of Computer Science and Information Security,6(2),145-154.
-
Li, Z.,QIBIN, S.,Lian, Y.,Giusto, D.D.(2005).An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack.Proceedings of the 2005 IEEE International Conference on Multimedia and EXPO
-
Liddle, J.,Renaud, K.,Angeli, A.D.(2003).Using a Combination of Sound and Images to Authenticate Web Users.Proceedings of the 17th Annual Human Computer Interaction Conference
-
Madigan, S.,Lawrence, V.(1980).Factors Affecting Item Recovery and Hypermnesia in Free Recall.American Journal of Psychology,93(3),489-504.
-
Man, S.,Hong, D.,Mathews, M.(2003).A Shoulder Surfing Resistant Graphical Password Scheme.Proceedings of the 2003 International Conference on Security and Management,Las Vegas:
-
Shepard, R.N.(1967).Recognition Memory for Words, Sentences, and Pictures.Journal of Verbal Learning and Verbal Behavior,6(1),156-163.
-
Sobrado, L.,Birget, J.C.(2002).Graphical Passwords.The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research
-
Thorpe, J.,van Oorschot, P.C.(2004).Graphical Dictionaries and the Memorable Space of Graphical Passwords.Proceedings of the 13th USENIX Security Symposium
-
Wang, L.,Cheng, X.,Ren, Z.,Gao, H.,Liu, X.,Aickelin, U.(2010).Against Spyware Using CAPTCHA in Graphical Password Scheme.Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications
-
Wiedenbeck, S.,Waters, J.,Birget, J.C.,Brodskiy, A.,Memon, N.(2005).PassPoints: Design and Longitudinal Evaluation of a Graphical Password System.International Journal of Human Computer Studies
-
Wiedenbeck, S.,Waters, J.,Sobrado, L.,Birget, J.C.(2006).Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme.Proceedings of the 2006 Advanced Visual Interfaces,Venice, Italy:
-
Yamamoto, T.,Kojima, Y.,Nishigaki, M.(2009).A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection.Proceedings of the 2009 International Conference on Security and Management
-
Zhao, H.,Li, X.(2007).S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme.Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops
-
Zheng, Z.,Liu, X.,Yin, L.,Liu, Z.(2010).A Hybrid Password Authentication Scheme Based on Shape and Text.Journal of Computers,5(5),765-772.
-
Zheng, Z.,Liu, X.,Yin, L.,Liu, Z.(2009).A Stroke-Based Textual Password Authentication Scheme.Proceedings of the First International Workshop on Education Technology and Computer Science
|