 
 
 
 
 
 
   
 Next: About this document ...
 Up: On User Choice in
 Previous: Acknowledgments
 
- 
 
- 1
- T. Alley and M. Cunningham. Averaged faces are
  attractive, but very attractive faces are not average. In     Psychological Science, 2, pages 123-125, 1991.
 
- 2
-  G. E. Blonder.  Graphical password.  US Patent
5559961, Lucent Technologies, Inc., Murray Hill, NJ, August 30, 1995.
 
- 3
-  S. Brostoff and M.. A. Sasse.  Are Passfaces more
usable than passwords?  A field trial investigation. In Proceedings
of Human Computer Interaction, pages 405-424, 2000. more
usable than passwords?  A field trial investigation. In Proceedings
of Human Computer Interaction, pages 405-424, 2000.
 
- 4
-  R. Dhamija and A. Perrig.  Déjà vu: A user
study using images for authentication.  In Proceedings of the  USENIX Security Symposium, August 2000. USENIX Security Symposium, August 2000.
 
- 5
-  D. Feldmeier and P. Karn.  UNIX password
security--Ten years later.  In Advances in Cryptology--CRYPTO
'89 (Lecture Notes in Computer Science 435), 1990.
 
- 6
-  A. Feingold. Good-looking people are not what we think.
  In Psychological Bulletin, 111, pages 304-341, 1992.
 
- 7
-  W. Jansen, S. Gavrila, V. Korolev, R. Ayers, and
  R. Swanstrom.  Picture password: A visual login technique for mobile
  devices.  NISTIR 7030, Computer Security Division, Information
  Technology Laboratory, National Institute of Standards and
  Technology, Gaithersburg, MD, July 2003.  Available at
  https://csrc.nist.gov/publications/nistir/nistir-7030.pdf.
 
- 8
-  I. Jermyn, A. Mayer, F. Monrose, M. Reiter and
A. Rubin.  The design and analysis of graphical passwords.  In Proceedings of the 8th USENIX Security Symposium, August 1999.
 
- 9
-  D. Klein.  Foiling the cracker: A survey of, and
improvements to, password security.  In Proceedings of the
 USENIX Security Workshop, pages 5-14, August 1990. USENIX Security Workshop, pages 5-14, August 1990.
 
- 10
-  J. Langlois, L. Kalakanis, A. Rubenstein, A. Larson,
M. Hallam, and M. Smoot. Maxims and myths of beauty: A meta-analytic
and theoretical review. In Psychological Bulletin 126:390-423,
2000.
 
- 11
-  D. Levin. Race as a visual feature: using visual
  search and perceptual discrimination tasks to understand face
  categories and the cross race recognition deficit. Quarterly
    Journal of Experimental Psychology:General, 129 (4), 559-574.
 
- 12
-  D. Lindsay, P. Jack, and M. Chrisitan. Other-race face
perception.  Journal of Applied Psychology 76:587-589, 1991.
 
- 13
-  T. Luce.  Blacks, whites and yellows: They all look alike
to me.  Psychology Today 8:105-108, 1974.
 
- 14
-  S. Madigan. Picture memory.  In Imagery,
Memory, and Cognition, pages 65-86, Lawrence Erlbaum Associates,
1983.
 
- 15
-  R. S. Malpass.  They all look alike to me. In The
Undaunted Psychologist, pages 74-88, McGraw-Hill, 1992.
 
- 16
-  C. Manning and H. Schütze.  Foundations of
Statistical Natural Language Processing, Chapter 6, MIT Press, May
1999.
 
- 17
-  A. M. Martinez and R. Benavente. The AR Face Database. 
Technical Report number 24, June, 1998.
 
- 18
-  J. L. Massey.  Guessing and entropy.  In Proceedings of the 1994 IEEE International Symposium on Information
Theory, 1994.
 
- 19
-  R. J. McEliece and Z. Yu.  An inequality on entropy.
In Proceedings of the 1995 IEEE International Symposium on
Information Theory, 1995.
 
- 20
- C. Meissner, J. Brigham. Thirty years of investigation
  the own-race advantage in memory for faces: A meta-analytic review.
  Psychology, Public Policy & Law, 7, pages 3-35, 2001.
 
- 21
-  G. A. Miller. The magical number seven, plus or
minus two: Some limits on our capacity for processing information.
Psychological Review 63:81-97, 1956.
 
- 22
-  R. Morris and K. Thompson.  Password security: A case
history.  Communications of the ACM 22(11):594-597, November
1979.
 
- 23
-  D. L. Nelson, U. S. Reed, and J. R. Walling.
Picture superiority effect.  Journal of Experimental Psychology:
Human Learning and Memory, 3:485-497, 1977.
 
- 24
-  The Science Behind Passfaces.
Revision 2, Real User Corporation, September 2001.  Available at
https://www.realuser.com/published/ScienceBehindPassfaces.pdf.
 
- 25
-  Strategies for using Passfaces for
Windows.  Real User Corporation, 2002.  Available at https://www.realuser.com/published/PassfacesforWindowsStrategies.pdf. for
Windows.  Real User Corporation, 2002.  Available at https://www.realuser.com/published/PassfacesforWindowsStrategies.pdf.
 
- 26
-  Asian Face Image Database PF01. Pohang University of Science
and Technology, Korea, 2001.
 
- 27
-  T. Valentine.  An evaluation of the Passfaces personal authentication system.  Technical Report, Goldsmiths College
University of London, 1998. personal authentication system.  Technical Report, Goldsmiths College
University of London, 1998.
 
- 28
-  T. Valentine.  Memory for Passfaces after a long
delay.  Technical Report, Goldsmiths College University of London,
1999. after a long
delay.  Technical Report, Goldsmiths College University of London,
1999.
 
- 29
-  T. Valentine and M. Endo. Towards an exemplar model
of face processing: The effects of race and distinctiveness. Quarterly Journal
of Experimental Psychology 44, 671-703.
 
- 30
-  Visual Key - Technology.  Available at https://www.viskey.com/tech.html.
 
- 31
- P. Walker and W. Tanaka. An encoding advantage for
  own-race versus other-race faces. In Perception, 23, pages
  1117-1125, 2003.
 
- 32
-  T. Wu.  A real-world analysis of Kerberos password
security.  In Proceedings of the 1999 ISOC Symposium on Network
and Distributed System Security, February 1999.
 
- 33
-  M. Zviran and W. J. Haga.  Cognitive passwords: The key
to easy access and control.  Computers and Security
9(8):723-736, 1990.
 
- 34
-  M. Zviran and W. J. Haga.  A comparison of password
techniques for multilevel authentication mechanisms.  The
Computer Journal 36(3):227-237, 1993.