Author:
Aljahdali Hani Moaiteq,Poet Ron
Reference24 articles.
1. Aljahdali, H. M., & Poet, R. (2013, July). The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on (pp. 1528--1534). IEEE.
2. Paivio, A. (1986). Mental Representations: A Dual-Coding Approach, Oxford University Press, New York.
3. Poet, R. and Renaud, K. (2010). An Algorithm for Automatically Choos- ing Distractors for Recognition Based Authentication using Minimal Image Types. The Ergonomics Open Journal, 2(3):178--184.
4. Thomas S. Tullis and Donna P. Tedesco. (2005). Using personal photos as pictorial passwords. In CHI '05 Extended Abstracts on Human Factors in Computing Systems (CHI EA '05). ACM, New York, NY, USA, 1841--1844.
5. Dhamija, R. and Perrig, A. (2000). Déjà Vu: User study using images for authentication. In Ninth Usenix Security Symposium.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Understanding Insider Attacks in Personalized Picture Password Schemes;Human-Computer Interaction – INTERACT 2021;2021
2. A Case Study of Graphical Passwords in a Chinese University;Adjunct Publication of the 28th ACM Conference on User Modeling, Adaptation and Personalization;2020-07-13
3. A Cross-cultural Perspective for Personalizing Picture Passwords;Proceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization;2020-07-07
4. TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes;Arabian Journal for Science and Engineering;2019-09-23
5. Is it better to choose seen or unseen distracters for graphical passwords;Proceedings of the 12th International Conference on Security of Information and Networks - SIN '19;2019