On user choice in graphical password schemes, Proceedings of the 13th USENIX Security Symposium. USENIX, 2004. ,
D` ejá vu: a user study using images for authentication, Proceedings of the 9th conference on USENIX Security Symposium, 2000. ,
Forcing johnny to login safely, Proceedings of the 16th Annual Symposium on Research in Computer Security (ESORICS) ,
DOI : 10.1007/978-3-642-23822-2_25
Quantifying the security of preferencebased authentication, DIM '08: Proceedings of the 4th ACM workshop on Digital identity management, pp.61-70, 2008. ,
Conditioned-safe ceremonies and a user study of an application to web authentication, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009. ,
DOI : 10.1145/1572532.1572578
Usable and phishing-resistant authentication mechanisms, 2011. ,
Personal knowledge questions for fallback authentication, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.13-23, 2008. ,
DOI : 10.1145/1408664.1408667
It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions, 2009 30th IEEE Symposium on Security and Privacy, pp.375-390, 2009. ,
DOI : 10.1109/SP.2009.11
Recognition memory for words, sentences, and pictures, Journal of Verbal Learning and Verbal Behavior, vol.6, issue.1, pp.156-163, 1967. ,
DOI : 10.1016/S0022-5371(67)80067-7
Graphical passwords: A survey, Proceedings of the 21st Annual Computer Security Applications Conference, pp.463-472, 2005. ,
Improving password security and memorability to protect personal and organizational information, International Journal of Human-Computer Studies, vol.65, issue.8, pp.65744-757, 2007. ,
DOI : 10.1016/j.ijhcs.2007.03.007
User authentication by cognitive passwords: an empirical assessment, Proceedings of the 5th Jerusalem Conference on Information Technology, 1990. 'Next Decade in Information Technology', pp.137-144, 1990. ,
DOI : 10.1109/JCIT.1990.128279