Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

Graphical password authentication using cued click points

S Chiasson, PC Van Oorschot, R Biddle - Computer Security–ESORICS …, 2007 - Springer
We propose and examine the usability and security of Cued Click Points (CCP), a cued-
recall graphical password technique. Users click on one point per image for a sequence of …

Reducing shoulder-surfing by using gaze-based password entry

M Kumar, T Garfinkel, D Boneh… - Proceedings of the 3rd …, 2007 - dl.acm.org
Shoulder-surfing--using direct observation techniques, such as looking over someone's
shoulder, to get passwords, PINs and other sensitive personal information--is a problem that …

Quantifying the security of graphical passwords: The case of android unlock patterns

S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …

[PDF][PDF] A Usability Study and Critique of Two Password Managers.

S Chiasson, PC van Oorschot, R Biddle - USENIX Security Symposium, 2006 - usenix.org
We present a usability study of two recent password manager proposals: PwdHash (Ross et
al., 2005) and Password Multiplier (Halderman et al., 2005). Both papers considered …

[PDF][PDF] The Password Thicket: Technical and Market Failures in Human Authentication on the Web.

J Bonneau, S Preibusch - WEIS, 2010 - jbonneau.com
We report the results of the first large-scale empirical analysis of password implementations
deployed on the Internet. Our study included 150 websites which offer free user accounts for …

Captcha as graphical passwords—A new security primitive based on hard AI problems

BB Zhu, J Yan, G Bao, M Yang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …