References
- R. Dhamija and A, Perrig, 'Deja Vu: A User Study Using Images for Authentication,' Proc. of 9th USENIX Security Symposium, p, 4, Aug, 2000
- S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskily, and N. Memon, 'PassPoints: Design and longitudinal evaluation of a graphical passwords system,' International Journal of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), vol. 63, pp. 102-127, May 2005 https://doi.org/10.1016/j.ijhcs.2005.04.010
- S, Wiedenbeck, J. Waters, L. Sobrado, and J.C. Birget, 'Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme,' Proc. of Advanced Visual Interfaces (AVI), pp. 177-184, May 2006 https://doi.org/10.1145/1133265.1133303
- T. Matsumoto and H, Imai, 'Human Identification Through Insecure Channel,' Proc. of EUROCRYT 91, LNCS 547, pp. 402-421, 1991
- N. Hopper and M. Blum, 'Secure Human Identification Protocols,' Proc. of ASIACRYPT, LNCS 2248, pp. 52-66, 2001
- D. Weinshall, 'Cognitive Authentication Schemes Safe Against Spyware (Short Paper),' Proc. of the 2006 IEEE Symposium on Security and Privacy (S&P), pp. 1-16, May 2006
- P. Golle and D. Wagner, 'Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract),' Proc. of the 2007 IEEE Symposium on Security and Privacy (S&P), pp. 66-70, May 2007
- H. Jameel, R.A. Shaikh, H. Lee, and S. Lee, 'Human Identification Through Image Evaluation Using Secret Predicates,' Proc. of The Cryptographer's Track at RSA Conference (CT-RSA), LNCS 4377, pp. 67-84, 2007
- H. Zhao and.X. Li, 'S3PAS: A Scalable Shoulder-Burfing, Resistant Textual-Graphical Password Authentication Scheme,' Proc. of 21st IEEE International Conference on Advanced Information Networking and Applications Workshop (AINAW), pp. 467-472, May 2007
- X. Bai, W. Gu, S. Chellappan, X.: Wang, D. Xuan, and B. Ma, 'PAS: Predicatebased Authentication Services Against Powerful Passive Adversaries,' Proc. of 200S Annual Computer Security Appli-cations Conference (ACSAC), pp. 433-442, Dec. 2008 https://doi.org/10.1109/ACSAC.2008.23
- Z. Zheng, X. Liu, L. Yin, and Z. Liu, 'A Stroke-based Textual Password Authentication Scheme,' Proc. of 2009 First International Workshop on Education Technology and Computer Science, pp. 90-95, Mar. 2009 https://doi.org/10.1109/ETCS.2009.544
- I. Jermynn, A. Mayer, F. Monrose, M.K. Reiter, and A.D. Rubin, 'The Design and Analysis of Graphical Passwords,' Proc. of the Sth USE NIX Security Symposium, p. 1, Aug. 1999