References
- [1]
-
F. Attneave.
Symmetry, Information and Memory for Patterns.
American Journal of Psychology, 68:209--222, 1955.
- [2]
-
J.-C. Birget, D. Hong, and N. Memon.
Robust Discretization, With an Application to Graphical Passwords.
Cryptology ePrint Archive, Report 2003/168, 2003.
http://eprint.iacr.org/, site accessed Jan. 12, 2004.
- [3]
-
G. H. Bower, M. B. Karlin, and A. Dueck.
Comprehension and Memory For Pictures.
Memory and Cognition, 3:216--220, 1975.
- [4]
-
M.W. Calkins.
Short Studies in Memory and Association from the Wellesley College
Laboratory.
Psychological Review, 5:451--462, 1898.
- [5]
-
D. Davis, F. Monrose, and M.K. Reiter.
On User Choice in Graphical Password Schemes.
In 13th USENIX Security Symposium, 2004.
- [6]
-
R. Dhamija and A. Perrig.
Déjà Vu: A User Study Using Images for Authentication.
In 9th USENIX Security Symposium, 2000.
- [7]
-
R.-S. French.
Identification of Dot Patterns From Memory as a Function of
Complexity.
Journal of Experimental Psychology, 47:22--26, 1954.
- [8]
-
J. Goldberg, J. Hagman, and V. Sazawal.
Doodling Our Way to Better Authentication, 2002.
CHI '02 extended abstracts on Human Factors in Computer Systems.
- [9]
-
S.-I. Ichikawa.
Measurement of Visual Memory Span by Means of the Recall of
Dot-in-Matrix Patterns.
Behavior Research Methods and Instrumentation, 14(3):309--313,
1982.
- [10]
-
J. Nakajima and M. Matsui.
Performance Analysis and Parallel Implementation of Dedicated Hash
Functions.
In Advances in Cryptology -- Proceedings of EUROCRYPT 2002,
pages 165--180, 2002.
- [11]
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin.
The Design and Analysis of Graphical Passwords.
8th USENIX Security Symposium, 1999.
- [12]
-
E. A. Kirkpatrick.
An Experimental Study of Memory.
Psychological Review, 1:602--609, 1894.
- [13]
-
D. Klein.
Foiling the Cracker: A Survey of, and Improvements to, Password
Security.
In The 2nd USENIX Security Workshop, pages 5--14, 1990.
- [14]
-
S. Madigan.
Picture Memory.
In John C. Yuille, editor, Imagery, Memory and Cognition, pages
65--89. Lawrence Erlbaum Associates Inc., N.J., U.S.A., 1983.
- [15]
-
S. Madigan and V. Lawrence.
Factors Affecting Item Recovery and Hypermnesia in Free Recall.
American Journal of Psychology, 93:489--504, 1980.
- [16]
-
F. Monrose.
Towards Stronger User Authentication.
PhD thesis, NY University, 1999.
http://www.cs.nyu.edu/csweb/Research/Theses/monrose_fabian.pdf,
site accessed January 12, 2004.
- [17]
-
A. Muffett.
Crack password cracker.
http://ciac.llnl.gov/ciac/ToolsUnixAuth.html, site
accessed Jan. 12, 2004.
- [18]
-
Openwall Project.
John the Ripper password cracker.
http://www.openwall.com/john/, site accessed Jan.7,
2004.
- [19]
-
Openwall Project.
Wordlists.
http://www.openwall.com/passwords/wordlists/, site
accessed Jan.7 2004.
- [20]
-
S.E. Palmer.
Vision Science: Photons to Phenomenology.
MIT Press, Cambridge, Mass., 1999.
- [21]
-
F.T. Perkins.
Symmetry in Visual Recall.
American Journal of Psychology, 44:473--490, 1932.
- [22]
-
A. Perrig and D. Song.
Hash Visualization: a New Technique to Improve Real-World Security.
In International Workshop on Cryptographic Techniques and
E-Commerce, pages 131--138, 1999.
- [23]
-
B. Pinkas and T. Sander.
Securing Passwords Against Dictionary Attacks.
In 9th ACM Conference on Computer and Communications Security,
pages 161--170. ACM Press, 2002.
- [24]
-
S. Stubblebine and P.C. van Oorschot.
Addressing Online Dictionary Attacks with Login Histories and
Humans-in-the-Loop.
In Financial Cryptography'04. Springer-Verlag LNCS (to appear),
2004.
- [25]
-
J. Thorpe and P.C. van Oorschot.
Graphical Dictionaries and the Memorable Space of Graphical
Passwords.
Extended version (in progress):
http://www.scs.carleton.ca/~jthorpe.
- [26]
-
C.W. Tyler.
Human Symmetry Perception.
In C.W. Tyler, editor, Human Symmetry Perception and its
Computational Analysis, pages 3--22. VSP, The Netherlands, 1996.
- [27]
-
J. Wagemans.
Detection of Visual Symmetries.
In C.W. Tyler, editor, Human Symmetry Perception and its
Computational Analysis, pages 25--48. VSP, The Netherlands, 1996.
- [28]
-
J. Yan.
A Note on Proactive Password Checking.
ACM New Security Paradigms Workshop, New Mexico, USA, 2001.
http://citeseer.nj.nec.com/yan01note.html, site accessed
Jan. 12, 2004.