PassPoints: Design and longitudinal evaluation of a graphical password system
S Wiedenbeck, J Waters, JC Birget, A Brodskiy… - International journal of …, 2005 - Elsevier
Computer security depends largely on passwords to authenticate human users. However,
users have difficulty remembering passwords over time if they choose a secure password, ie …
users have difficulty remembering passwords over time if they choose a secure password, ie …
Graphical passwords: A survey
X Suo, Y Zhu, GS Owen - 21st Annual Computer Security …, 2005 - ieeexplore.ieee.org
The most common computer authentication method is to use alphanumerical usernames
and passwords. This method has been shown to have significant drawbacks. For example …
and passwords. This method has been shown to have significant drawbacks. For example …
Authentication using graphical passwords: Effects of tolerance and image choice
S Wiedenbeck, J Waters, JC Birget, A Brodskiy… - Proceedings of the …, 2005 - dl.acm.org
Graphical passwords are an alternative to alphanumeric passwords in which users click on
images to authenticate themselves rather than type alphanumeric strings. We have …
images to authenticate themselves rather than type alphanumeric strings. We have …
Adversary models for mobile device authentication
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
F Tari, AA Ozok, SH Holden - Proceedings of the second symposium on …, 2006 - dl.acm.org
Previous research has found graphical passwords to be more memorable than non-
dictionary or" strong" alphanumeric passwords. Participants in a prior study expressed …
dictionary or" strong" alphanumeric passwords. Participants in a prior study expressed …
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
The weakness of knowledge-based authentication systems, such as passwords and
Personal Identification Numbers (PINs), is well known, and reflects an uneasy compromise …
Personal Identification Numbers (PINs), is well known, and reflects an uneasy compromise …
Modeling user choice in the PassPoints graphical password scheme
We develop a model to identify the most likely regions for users to click in order to create
graphical passwords in the PassPoints system. A PassPoints password is a sequence of …
graphical passwords in the PassPoints system. A PassPoints password is a sequence of …
Systems, methods and apparatus for controlling access to mobile devices
CR Crawford, JS Nell - US Patent 8,346,217, 2013 - Google Patents
US8346217B2 - Systems, methods and apparatus for controlling access to mobile devices -
Google Patents US8346217B2 - Systems, methods and apparatus for controlling access to mobile …
Google Patents US8346217B2 - Systems, methods and apparatus for controlling access to mobile …
Cognitive authentication schemes safe against spyware
D Weinshall - 2006 IEEE Symposium on Security and Privacy …, 2006 - ieeexplore.ieee.org
Can we secure user authentication against eavesdrop** adversaries, relying on human
cognitive functions alone, unassisted by any external computational device? To accomplish …
cognitive functions alone, unassisted by any external computational device? To accomplish …
Towards reliable storage of 56-bit secrets in human memory
J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …