PassPoints: Design and longitudinal evaluation of a graphical password system

S Wiedenbeck, J Waters, JC Birget, A Brodskiy… - International journal of …, 2005 - Elsevier
Computer security depends largely on passwords to authenticate human users. However,
users have difficulty remembering passwords over time if they choose a secure password, ie …

Graphical passwords: A survey

X Suo, Y Zhu, GS Owen - 21st Annual Computer Security …, 2005 - ieeexplore.ieee.org
The most common computer authentication method is to use alphanumerical usernames
and passwords. This method has been shown to have significant drawbacks. For example …

Authentication using graphical passwords: Effects of tolerance and image choice

S Wiedenbeck, J Waters, JC Birget, A Brodskiy… - Proceedings of the …, 2005 - dl.acm.org
Graphical passwords are an alternative to alphanumeric passwords in which users click on
images to authenticate themselves rather than type alphanumeric strings. We have …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords

F Tari, AA Ozok, SH Holden - Proceedings of the second symposium on …, 2006 - dl.acm.org
Previous research has found graphical passwords to be more memorable than non-
dictionary or" strong" alphanumeric passwords. Participants in a prior study expressed …

Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems

A De Angeli, L Coventry, G Johnson… - International journal of …, 2005 - Elsevier
The weakness of knowledge-based authentication systems, such as passwords and
Personal Identification Numbers (PINs), is well known, and reflects an uneasy compromise …

Modeling user choice in the PassPoints graphical password scheme

AE Dirik, N Memon, JC Birget - Proceedings of the 3rd symposium on …, 2007 - dl.acm.org
We develop a model to identify the most likely regions for users to click in order to create
graphical passwords in the PassPoints system. A PassPoints password is a sequence of …

Systems, methods and apparatus for controlling access to mobile devices

CR Crawford, JS Nell - US Patent 8,346,217, 2013 - Google Patents
US8346217B2 - Systems, methods and apparatus for controlling access to mobile devices -
Google Patents US8346217B2 - Systems, methods and apparatus for controlling access to mobile …

Cognitive authentication schemes safe against spyware

D Weinshall - 2006 IEEE Symposium on Security and Privacy …, 2006 - ieeexplore.ieee.org
Can we secure user authentication against eavesdrop** adversaries, relying on human
cognitive functions alone, unassisted by any external computational device? To accomplish …

Towards reliable storage of 56-bit secrets in human memory

J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …