Of passwords and people, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2595-2604, 2011. ,
DOI : 10.1145/1978942.1979321
The true cost of unusable password policies, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.383-392, 2010. ,
DOI : 10.1145/1753326.1753384
A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.657-666, 2007. ,
DOI : 10.1145/1242572.1242661
Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999. ,
DOI : 10.1145/322796.322806
Encountering stronger password requirements, Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, 2010. ,
DOI : 10.1145/1837110.1837113
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, 2012 IEEE Symposium on Security and Privacy, pp.553-567, 2012. ,
DOI : 10.1109/SP.2012.44
Guessing click-based graphical passwords by eye tracking, 2010 Eighth International Conference on Privacy, Security and Trust, pp.197-204, 2010. ,
DOI : 10.1109/PST.2010.5593249
Improving multiple-password recall: an empirical study, European Journal of Information Systems, vol.17, issue.1, pp.165-176, 2009. ,
DOI : 10.1109/MSP.2004.81
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.128-152, 2005. ,
DOI : 10.1016/j.ijhcs.2005.04.020
A comprehensive study of frequency, interference, and training of multiple graphical passwords, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.889-898, 2009. ,
DOI : 10.1145/1518701.1518837
Can users remember their pictorial passwords six years later, Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems, CHI EA '11, pp.1789-1794, 2011. ,
DOI : 10.1145/1979742.1979945
Graphical passwords, ACM Computing Surveys, vol.44, issue.4, p.41, 2012. ,
DOI : 10.1145/2333112.2333114
Are Passfaces More Usable than Passwords: A Field Trial Investigation UK (2000) 15. Passfaces Corporation. The science behind Passfaces, BCS International Conference on People and Computers, pp.405-410 ,
DOI : 10.1007/978-1-4471-0515-2_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.6603
A comprehensive study of frequency, interference, and training of multiple graphical passwords, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.889-898, 2009. ,
DOI : 10.1145/1518701.1518837
Exploring usability effects of increasing security in click-based graphical passwords, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.79-88, 2010. ,
DOI : 10.1145/1920261.1920273
The Design and Analysis of Graphical Passwords, USENIX Security Symposium, pp.1-1, 1999. ,
YAGP: Yet Another Graphical Password Strategy, 2008 Annual Computer Security Applications Conference (ACSAC), pp.121-129, 2008. ,
DOI : 10.1109/ACSAC.2008.19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.653.2256
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords, J. Network Security, vol.7, issue.2, pp.273-292, 2008. ,
Authentication using graphical passwords, Proceedings of the 2005 symposium on Usable privacy and security , SOUPS '05, pp.1-12, 2005. ,
DOI : 10.1145/1073001.1073002
Influencing Users Towards Better Passwords: Persuasive Cued Click-Points, BCS International Conference on People and Computers, pp.121-130, 2008. ,
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.3011-3020, 2012. ,
DOI : 10.1145/2207676.2208712
On designing usable and secure recognition-based graphical authentication mechanisms, Interacting with Computers, vol.23, issue.6, pp.582-593, 2011. ,
DOI : 10.1016/j.intcom.2011.09.001
A security assessment of tiles, Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, CHI EA '12, pp.1967-1972, 2012. ,
DOI : 10.1145/2212776.2223737
Improving text passwords through persuasion, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.1-12, 2008. ,
DOI : 10.1145/1408664.1408666
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.6173
Do you see your password?, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, 2012. ,
DOI : 10.1145/2335356.2335367
Human selection of mnemonic phrase-based passwords, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.67-78, 2006. ,
DOI : 10.1145/1143120.1143129
A convenient method for securely managing passwords, Proceedings of the 14th international conference on World Wide Web , WWW '05, pp.471-479, 2005. ,
DOI : 10.1145/1060745.1060815
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3756
Usability Study and Critique of Two Password Managers, USENIX Security Symposium, pp.1-16, 2006. ,
The Adaptive Web: Methods and Strategies of Web Personalization, 2007. ,
DOI : 10.1007/978-3-540-72079-9
Mind and Its Evolution: A Dual Coding Theoretical Approach, 2006. ,
Picture superiority in free recall: Imagery or dual coding?, Cognitive Psychology, vol.5, issue.2, pp.176-206, 1973. ,
DOI : 10.1016/0010-0285(73)90032-7
Cognitive Psychology and its Implications: Seventh Edition, 2009. ,
The worth of pictures: Using high density event-related potentials to understand the memorial power of pictures and the dynamics of recognition memory, NeuroImage, vol.35, issue.1, pp.378-395, 2007. ,
DOI : 10.1016/j.neuroimage.2006.11.023
Visual long-term memory has a massive storage capacity for object details, Proceedings of the National Academy of Sciences, vol.43, issue.6, pp.14325-14329, 2008. ,
DOI : 10.1016/j.neuropsychologia.2004.09.014
URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2533687
Memory for Pictures: Sometimes a Picture is not Worth a Single Word. Successful Remembering and Successful Forgetting: A Festschrift in Honor of Robert A, Bjork. J, pp.447-462, 2010. ,
Insights from child development on the relationship between episodic and semantic memory, Neuropsychologia, vol.45, issue.14, pp.3178-3189, 2007. ,
DOI : 10.1016/j.neuropsychologia.2007.06.021
Cognitive Styles???an overview and integration, Educational Psychology, vol.47, issue.3-4, pp.193-215, 1991. ,
DOI : 10.1037/13128-000
Researching the psychology of cognitive style and learning style: Is there really a future?, Learning and Individual Differences, vol.19, issue.4, pp.518-523, 2009. ,
DOI : 10.1016/j.lindif.2009.06.003
The new object-spatial-verbal cognitive style model: Theory and measurement, Applied Cognitive Psychology, vol.2, issue.5, pp.638-663, 2009. ,
DOI : 10.1002/acp.1473
A new measure of Verbal???Imagery Cognitive Style: VICS, Personality and Individual Differences, vol.38, issue.6, pp.1269-1281, 2005. ,
DOI : 10.1016/j.paid.2004.08.009
Cognitive Styles Analysis. Learning and Training Technology, 2001. ,
Cognitive styles in the context of modern psychology: Toward an integrated framework of cognitive style., Psychological Bulletin, vol.133, issue.3, pp.464-481, 2007. ,
DOI : 10.1037/0033-2909.133.3.464
Measuring Visual Imagery Ability: A Review, Imagination, Cognition and Personality, vol.26, issue.3, pp.191-211, 2007. ,
DOI : 10.2190/3515-8169-24J8-7157
Web searching interaction model based on user cognitive styles, Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction, OZCHI '10, pp.340-343, 2010. ,
DOI : 10.1145/1952222.1952296
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.670.4126
Temporal and Associative Memory in Chinese and English, Journal of Consumer Research, vol.26, issue.2, pp.170-181, 1999. ,
DOI : 10.1086/209558
A Research Agenda Acknowledging the Persistence of Passwords, IEEE Security & Privacy Magazine, vol.10, issue.1, pp.28-36, 2012. ,
DOI : 10.1109/MSP.2011.150