20
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

A Free Drawing Graphical Password Scheme

&
Pages 553-561 | Published online: 12 Aug 2013

References

  • Adams, A.; Sasse, M. A.: Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures, Communications of the ACM, 42, 1999, 41–46.
  • Anderson, R. J.: Why Cryptosystems Fail, Communications of the ACM, 37, 1994, 32–40.
  • Davis, D.; Monrose, F.; Reiter, M. K.: On user choice in graphical password schemes, in Proceedings of the 13th Usenix Security Symposium, San Diego, CA, 2004.
  • Department of Defense Computer Security Center: Department of Defense Password Management Guideline, Department of Defense, Washington, DC, CSC–STD–002–85, April 12, 1985.
  • Doyle, P.; Hanna, S.: Analysis of June 2003 Survey on Obstacles to PKI Deployment and Usage, Organization for the Advancement of Structured Information Standards, Billerica, MA, August 8, 2003.
  • Jermyn, I.; Mayer, A.; Monrose, F.; Reiter, M. K.; Rubin, A. D.: The Design and Analysis of Graphical Passwords, in Proceedings of the 8th USENIX Security Symposium, 1999.
  • Shepard, R. N.: Recognition memory for words, sentences, and pictures, Journal of Verbal Learning and Verbal Behavior, 6, 1967, 156–163.
  • Syukri, A. F.; Okamoto, E.; Mambo, M. A.: User Identification System Using Signature Written with Mouse, in Third Australasian Conference on Information Security and Privacy (ACISP): Springer-Verlag Lecture Notes in Computer Science (1438), 1998, 403–441.
  • Thomas, R. C.; Karahasanovic, A.; Kennedy, G. E.: An Investigation into Keystroke Latency Metrics as an Indicator of Programming Performance, presented at Australasian Computing Education Conference 2005, Newcastle, Australia, 2005.
  • Thorpe, J.; Oorschot, P. C. V.: Graphical Dictionaries and the Memorable Space of Graphical Passwords, in Proceedings of the 13th USENIX Security Symposium, San Deigo, USA: USENIX, 2004.
  • Van Oorschot, P. C.; Thorpe, J.: On Predictive Models and User-Drawn Graphical Passwords, ACM Transactions on Information and System Security, 10(4), Article 17, 2008, 1–33
  • Whitten, A.; Tygar, J. D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0, presented at 8th Usenix Security Symposium, Washington, DC, 1999.
  • Wolff, W.: Diagrams of the unconscious; handwriting and personality in measurement, experiment and analysis New York, Grune & Stratton, 1948.
  • Yan, J.; Blackwell, A.; Anderson, R.; Grant, A.: Password Memorability and Security: Empirical Results, IEEE Privacy & Security, 2, 2004, 25–31.
  • Zhu, X.; Suo, Y.; Owen, G. S.: Graphical Passwords: A Survey In proceedings of ACSAC, IEEE Computer Society, 2005, 463–472.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.