References
- A. Adams and M.A. Sasse, Users are not the enemy, Commun. ACM 42 (1999), pp. 40–46. doi: 10.1145/322796.322806
- A.J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J.M. Smith, Smudge attacks on smartphone touch screens, Proceedings of the 4th USENIX Workshop on Offensive Technologies, Washington, DC, USA, 2010.
- D.V. Beard, D.K. Smith, and K.M. Denelsbeck, QGOMS: A direct-manipulation tool for simple GOMS models, Proceedings of International Conference on Human Factors in Computing Systems, Vancouver, British Columbia, Canada, 1996, pp. 25–26.
- L. Brown (ed.), Shorter Oxford English Dictionary, 6th ed., Oxford University Press, New York, 2007.
- D. Chuan, Y. Lin, M. Linru, and C. Yuan, Towards a practical and scalable trusted software dissemination system, J. Converg. 2 (2011), pp. 53–60.
- P. Dunphy and J. Yan, Do background images improve “draw a secret” graphical passwords?, Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2007, pp. 36–47.
- Goms-analysen mit gomsed, 2002. Available at http://www-cgi.psychologie.tu-darmstadt.de/kogpsy/indexgoms.htm.
- M.D. Hafiz, A.H. Abdullah, N. Ithnin, and H.K. Mammi, Towards identifying usability and security features of graphical password in knowledge based authentication technique, Proceedings of the Second Asia International Conference on Modeling Simulation, Kuala Lumpur, Malaysia, 2008, pp. 396–403.
- B.E. John and D.E. Kieras, The goms family of user interface analysis techniques: Comparison and contrast, ACM Trans. Comp. Hum. Interact. 3 (1996), pp. 320–351. doi: 10.1145/235833.236054
- B.E. John, K. Prevas, D.D. Salvucci, and K. Koedinger, Predictive human performance modeling made easy, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vienna, Austria, 2004, pp. 455–462.
- M.D.E.C.E. Kettani and B. En-Nasry, Midm: An open architecture for mobile identity management, J. Converg. 2 (2011), pp. 25–32.
- A.H. Lashkari and S. Farmand, A survey on usability and security features in graphical user authentication algorithms, Int. J. Comp. Sci. Netw. Secur. 9 (2009), pp. 195–204.
- S. Lee and R. Myung, Modified goms-model for mobile computing, J. Soc. Korea Ind. Syst. Eng. 32 (2009), pp. 85–93.
- A.D. Luca, K. Hertzschuch, and H. Hussmann, ColorPIN: Securing PIN entry through indirect input, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA, 2010, pp. 1103–1106.
- Lumensoft, Available at http://lumensoft.co.kr/eng/solution/mtranskey.php.
- Mininfo co., Available at http://www.mininfo.co.kr/solution/dementor_sgp_2.php.
- C. Paar and J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, Springer, Berlin, Heidelberg, 2010.
- S.B. Park, A method for preventing input information from exposing to observers, patent App. No.: 10-2004-0039209, Korea, 2004.
- Passfaces, Available at http://www.realuser.com.
- V. Roth, K. Richter, and R. Freidinger, A PIN-Entry method resilient against shoulder surfing, Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2004, pp. 236–245.
- P. Shi, B. Zhu, and A. Youssef, A PIN entry scheme resistant to recording-based shoulder-surfing, Proceedings of the 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, Athens, Glyfada, Greece, 2009, pp. 237–241.
- R.Y. Shtykh and Q. Jin, A human-centric integrated approach to web information search and sharing, Human-centric Comput. Inf. Sci. 1(2) (2011), pp. 1–37.
- T. Takada, FakePointer: An authentication scheme for improving security against peeping attacks using video cameras, Proceedings of the Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Valencia, Spain, 2008, pp. 395–400.
- T. Teraoka, Organization and exploration of heterogeneous personal data collected in daily life, Human-centric Comput. Inf. Sci. 2(1) (2012), pp. 1–15. doi: 10.1186/2192-1962-2-1
- C.S.C. (USA), Department of Defense Password Management Guideline, CSC-STD-002-85, Department of Defense Computer Security Center, Fort George G. Meade, MD, 1986.
- S. Wiedenbeck, J. Waters, L. Sobrado, and J.C. Birget, Design and evaluation of a shoulder-surfing resistant graphical password scheme, Proceedings of the Working Conference on Advanced Visual Interfaces, Venezia, Italy, 2006, pp. 177–184.
- J. Yan, A. Blackwell, R. Anderson, and A. Grant, Password memorability and security: Empirical results, IEEE Secur. Priv. 2 (2004), pp. 25–31. doi: 10.1109/MSP.2004.81
- J.H. Yi, G. Ma, H. Yi, and S. Kim, Method and apparatus for authenticating password using scroll wheel of user device, patent App. No.: 10-2011-0128303, Korea, 2011.