Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.128-152, 2005. ,
DOI : 10.1016/j.ijhcs.2005.04.020
Graphical Password Authentication Using Cued Click Points, 12th European Symposium On Research In Computer Security, pp.359-374, 2007. ,
DOI : 10.1007/978-3-540-74835-9_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.866
Increasing security and usability of computer systems with graphical passwords, Proceedings of the 45th annual southeast regional conference on , ACM-SE 45, pp.529-530, 2007. ,
DOI : 10.1145/1233341.1233448
User interface design affects security: patterns in click-based graphical passwords, International Journal of Information Security, vol.63, issue.3, pp.387-398, 2009. ,
DOI : 10.1007/s10207-009-0080-7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.6347
PassPoints: Design and longitudinal evaluation of a graphical password system, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.102-127, 2005. ,
DOI : 10.1016/j.ijhcs.2005.04.010
Purely Automated Attacks on PassPoints-Style Graphical Passwords, IEEE Transactions on Information Forensics and Security, vol.5, issue.3, pp.393-405, 2010. ,
DOI : 10.1109/TIFS.2010.2053706
On user choice in graphical password schemes, Proceedings of the 13th USENIX security symposium, pp.1-11, 2004. ,
Using personal photos as pictorial passwords, CHI '05 extended abstracts on Human factors in computing systems , CHI '05, pp.1841-1844, 2005. ,
DOI : 10.1145/1056808.1057036
A comprehensive study of frequency, interference, and training of multiple graphical passwords, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.889-898, 2009. ,
DOI : 10.1145/1518701.1518837
Modelling user choice in the Passpoints graphical password scheme. Paper presented at the Symposium On Usable Privacy and Security, 2007. ,
Click Passwords Under Investigation, Computer Security -ESORICS 2007, pp.343-358, 2007. ,
DOI : 10.1007/978-3-540-74835-9_23
Picture passwords superiority and picture passwords dictionary attacks, Journal of Information Assurance and Security, vol.2, pp.179-183, 2007. ,
Heuristic Attacks against graphical password generators, Proceedings of the South African Information Security Multi-Conference, pp.272-284, 2010. ,
Graphical Passwords Using Images with Random Tracks of Geometric Shapes, 2008 Congress on Image and Signal Processing, pp.27-31, 2008. ,
DOI : 10.1109/CISP.2008.603
A User Authentication System Using Schema of Visual Memory, LNCS: Biologically Inspired Approaches to Advanced Information Technology, vol.3853, pp.338-345, 2006. ,
DOI : 10.1007/11613022_28
Use Your Illusion, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.35-45, 2008. ,
DOI : 10.1145/1408664.1408670
Influencing users towards better passwords: persuasive cued click-points, Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, pp.121-130, 2008. ,
Assessing image???based authentication techniques in a web???based environment, Information Management & Computer Security, vol.18, issue.1, pp.43-53, 2010. ,
DOI : 10.1016/j.ijhcs.2005.04.010
A second look at the usability of click-based graphical passwords, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.1-12, 2007. ,
DOI : 10.1145/1280680.1280682