Author:
Cain Ashley A.,Still Jeremiah D.
Publisher
Springer International Publishing
Reference27 articles.
1. Nicholson, J., Coventry, L., Briggs, P.: Faces and pictures: understanding age differences in two types of graphical authentications. Int. J. Hum Comput. Stud. 71(10), 958–966 (2013)
2. Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Computer security applications conference, 21st annual, pp. 463–472. IEEE (2005, December)
3. Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Convergence and Hybrid Information Technology, 2008. ICCIT’08. Third International Conference on, vol. 2, pp. 1137–1143. IEEE (2008, November)
4. Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manage. Inf. Syst., pp. 161–185 (1999)
5. Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Pass Points: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1), 102–127 (2005)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Over-the-Shoulder Attack Resistant Graphical Authentication Schemes Impact on Working Memory;Advances in Intelligent Systems and Computing;2019-06-06
2. Graphical Authentication Schemes: Balancing Amount of Image Distortion;Advances in Intelligent Systems and Computing;2018-06-24
3. Human-centered authentication guidelines;Information & Computer Security;2017-10-09
4. Graphical Authentication Resistance to Over-the-Shoulder-Attacks;Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems;2017-05-06