Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999. ,
DOI : 10.1145/322796.322806
Interactions of Memory and Perception in Amnesia: The Figure-Ground Perspective, Cerebral Cortex, vol.22, issue.11, pp.2680-2691, 2012. ,
DOI : 10.1093/cercor/bhr347
Models of recognition, repetition priming, and fluency: Exploring a new framework., Psychological Review, vol.119, issue.1, pp.40-79, 2012. ,
DOI : 10.1037/a0025464
Graphical passwords, ACM Computing Surveys, vol.44, issue.4, pp.1-1941, 2012. ,
DOI : 10.1145/2333112.2333114
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23094
URL : http://arxiv.org/abs/1410.1490
Neuroscience meets cryptography, USENIX Security Symposium, ser. SSYM '12, pp.129-141, 2012. ,
DOI : 10.1145/2594445
Secrets, Lies, and Account Recovery, Proceedings of the 24th International Conference on World Wide Web, WWW '15, pp.141-150, 2015. ,
DOI : 10.1145/2736277.2741691
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, 2012 IEEE Symposium on Security and Privacy, pp.553-567, 2012. ,
DOI : 10.1109/SP.2012.44
What's in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions, " in Financial Cryptography and Data Security, ser. FC '10, pp.98-113, 2010. ,
The Password Thicket: Technical and Market Failures in Human Authentication on the Web, Workshop on the Economics of Information Security, ser. WEIS '10, 2010. ,
Towards Reliable Storage of 56-bit Secrets in Human Memory, USENIX Security Symposium, ser. SSYM '14, pp.607-623, 2014. ,
Fourth-factor authentication, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.168-178, 2006. ,
DOI : 10.1145/1180405.1180427
Very Long-Lasting Priming in Picture Naming, Psychological Science, vol.8, issue.4, pp.322-325, 1997. ,
DOI : 10.1037/0278-7393.13.3.501
On User Choice in Graphical Password Schemes, USENIX Security Symposium, ser. SSYM '04, pp.151-164, 2004. ,
ImageNet: A Large-Scale Hierarchical Image Database, IEEE Conference on Computer Vision and Pattern Recognition, ser. CVPR '09, pp.248-255, 2009. ,
Exploring implicit memory for painless password recovery, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2615-2618, 2011. ,
DOI : 10.1145/1978942.1979323
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.229.1461
How the Brain Learns to See Objects and Faces in an Impoverished Context, Nature, vol.389, issue.6651, pp.596-599, 1997. ,
DOI : 10.1038/39309
Email-based identification and authentication: an alternative to PKI?, IEEE Security & Privacy Magazine, vol.1, issue.6, pp.20-26, 2003. ,
DOI : 10.1109/MSECP.2003.1253564
The Biology of the Mind, 2013. ,
Learning and Memory: From Brain to Behavior, 2014. ,
Messin??? with Texas Deriving Mother???s Maiden Names Using Public Records, Conference on Applied Cryptography and Network Security, ser. ACNS '05, pp.91-103, 2005. ,
DOI : 10.1007/11496137_7
Use Your Illusion, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.35-45, 2008. ,
DOI : 10.1145/1408664.1408670
Google Aims to Kill Passwords, 2016. ,
Recognition Alters the Spatial Pattern of fMRI Activation in Early Retinotopic Cortex, Changes in Functional Connectivity Support Conscious Object Recognition, pp.1501-1507, 2010. ,
DOI : 10.1152/jn.00812.2009
MoonBase: Generating a database of two-tone "Mooney" images, Journal of Vision, vol.13, issue.9, pp.50-50, 2013. ,
DOI : 10.1167/13.9.50
Generation and the subjective feeling of ???aha!??? are independently related to learning from insight, Psychological Research, vol.25, issue.11, pp.1059-1074, 2016. ,
DOI : 10.1523/JNEUROSCI.5295-04.2005
Uncovering Camouflage: Amygdala Activation Predicts Long-Term Memory of Induced Perceptual Insight, Neuron, vol.69, issue.5, pp.1002-1014, 2011. ,
DOI : 10.1016/j.neuron.2011.02.013
Facilitation in recognizing pairs of words: Evidence of a dependence between retrieval operations., Journal of Experimental Psychology, vol.90, issue.2, pp.227-234, 1971. ,
DOI : 10.1037/h0031564
Dissociations between procedural and episodic memory: Effects of time and aging., Psychology and Aging, vol.5, issue.2, pp.264-276, 1990. ,
DOI : 10.1037/0882-7974.5.2.264
Age in the development of closure ability in children., Canadian Journal of Psychology/Revue canadienne de psychologie, vol.11, issue.4, pp.219-226, 1957. ,
DOI : 10.1037/h0083717
Yahoo Wants to Kill Passwords http://www.cnet. com/news/yahoo-wants-to-kill-passwords-with-revamped-mail-app, 2015. ,
A Threshold Selection Method from Gray-Level Histograms, IEEE Transactions on Systems, Man, and Cybernetics, vol.9, issue.1, pp.62-66, 1979. ,
DOI : 10.1109/TSMC.1979.4310076
The Science Behind Passfaces, 2004. ,
Pictures or Questions? Examining User Responses to Association-Based Authentication, BCS Conference on Human-Computer Interaction, ser. HCI '10, pp.98-107, 2010. ,
Neuroimaging of Priming: New Perspectives on Implicit and Explicit Memory, Current Directions in Psychological Science, vol.8, issue.1, pp.1-4, 2001. ,
DOI : 10.1037/0033-295X.99.2.195
It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions, 2009 30th IEEE Symposium on Security and Privacy, pp.375-390, 2009. ,
DOI : 10.1109/SP.2009.11
It's Not What You Know, But Who You Know: A Social Approach to Last-Resort Authentication, SIGCHI Conference on Human Factors in Computing Systems, ser. CHI '09, pp.1983-1992, 2009. ,
A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948. ,
DOI : 10.1002/j.1538-7305.1948.tb01338.x
Oscillatory Gamma-Band (30-70 Hz) Activity Induced by a Visual Search Task in Humans, The Journal of Neuroscience, vol.17, issue.2, pp.722-734, 1997. ,
Linking Implicit and Explicit Memory: Common Encoding Factors and Shared Representations, Neuron, vol.49, issue.6, pp.917-927, 2006. ,
DOI : 10.1016/j.neuron.2006.01.030
URL : http://doi.org/10.1016/j.neuron.2006.01.030
Passwords you'll never forget, but can't recall, Extended abstracts of the 2004 conference on Human factors and computing systems , CHI '04, pp.1399-1402, 2004. ,
DOI : 10.1145/985921.986074
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.2521
MRC psycholinguistic database: Machine-usable dictionary, version 2.00, Behavior Research Methods, Instruments, & Computers, vol.17, issue.1, pp.6-10, 1988. ,
DOI : 10.3758/BF03202594
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.52.6928
A Comparison of Password Techniques for Multilevel Authentication Mechanisms, The Computer Journal, vol.36, issue.3, pp.227-237, 1993. ,
DOI : 10.1093/comjnl/36.3.227