Check out the new USENIX Web site. Previous Up

References

[1]
F. Attneave. Symmetry, Information and Memory for Patterns. American Journal of Psychology, 68:209--222, 1955.

[2]
J.-C. Birget, D. Hong, and N. Memon. Robust Discretization, With an Application to Graphical Passwords. Cryptology ePrint Archive, Report 2003/168, 2003. http://eprint.iacr.org/, site accessed Jan. 12, 2004.

[3]
G. H. Bower, M. B. Karlin, and A. Dueck. Comprehension and Memory For Pictures. Memory and Cognition, 3:216--220, 1975.

[4]
M.W. Calkins. Short Studies in Memory and Association from the Wellesley College Laboratory. Psychological Review, 5:451--462, 1898.

[5]
D. Davis, F. Monrose, and M.K. Reiter. On User Choice in Graphical Password Schemes. In 13th USENIX Security Symposium, 2004.

[6]
R. Dhamija and A. Perrig. Déjà Vu: A User Study Using Images for Authentication. In 9th USENIX Security Symposium, 2000.

[7]
R.-S. French. Identification of Dot Patterns From Memory as a Function of Complexity. Journal of Experimental Psychology, 47:22--26, 1954.

[8]
J. Goldberg, J. Hagman, and V. Sazawal. Doodling Our Way to Better Authentication, 2002. CHI '02 extended abstracts on Human Factors in Computer Systems.

[9]
S.-I. Ichikawa. Measurement of Visual Memory Span by Means of the Recall of Dot-in-Matrix Patterns. Behavior Research Methods and Instrumentation, 14(3):309--313, 1982.

[10]
J. Nakajima and M. Matsui. Performance Analysis and Parallel Implementation of Dedicated Hash Functions. In Advances in Cryptology -- Proceedings of EUROCRYPT 2002, pages 165--180, 2002.

[11]
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The Design and Analysis of Graphical Passwords. 8th USENIX Security Symposium, 1999.

[12]
E. A. Kirkpatrick. An Experimental Study of Memory. Psychological Review, 1:602--609, 1894.

[13]
D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In The 2nd USENIX Security Workshop, pages 5--14, 1990.

[14]
S. Madigan. Picture Memory. In John C. Yuille, editor, Imagery, Memory and Cognition, pages 65--89. Lawrence Erlbaum Associates Inc., N.J., U.S.A., 1983.

[15]
S. Madigan and V. Lawrence. Factors Affecting Item Recovery and Hypermnesia in Free Recall. American Journal of Psychology, 93:489--504, 1980.

[16]
F. Monrose. Towards Stronger User Authentication. PhD thesis, NY University, 1999. http://www.cs.nyu.edu/csweb/Research/Theses/monrose_fabian.pdf, site accessed January 12, 2004.

[17]
A. Muffett. Crack password cracker. http://ciac.llnl.gov/ciac/ToolsUnixAuth.html, site accessed Jan. 12, 2004.

[18]
Openwall Project. John the Ripper password cracker. http://www.openwall.com/john/, site accessed Jan.7, 2004.

[19]
Openwall Project. Wordlists. http://www.openwall.com/passwords/wordlists/, site accessed Jan.7 2004.

[20]
S.E. Palmer. Vision Science: Photons to Phenomenology. MIT Press, Cambridge, Mass., 1999.

[21]
F.T. Perkins. Symmetry in Visual Recall. American Journal of Psychology, 44:473--490, 1932.

[22]
A. Perrig and D. Song. Hash Visualization: a New Technique to Improve Real-World Security. In International Workshop on Cryptographic Techniques and E-Commerce, pages 131--138, 1999.

[23]
B. Pinkas and T. Sander. Securing Passwords Against Dictionary Attacks. In 9th ACM Conference on Computer and Communications Security, pages 161--170. ACM Press, 2002.

[24]
S. Stubblebine and P.C. van Oorschot. Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop. In Financial Cryptography'04. Springer-Verlag LNCS (to appear), 2004.

[25]
J. Thorpe and P.C. van Oorschot. Graphical Dictionaries and the Memorable Space of Graphical Passwords. Extended version (in progress): http://www.scs.carleton.ca/~jthorpe.

[26]
C.W. Tyler. Human Symmetry Perception. In C.W. Tyler, editor, Human Symmetry Perception and its Computational Analysis, pages 3--22. VSP, The Netherlands, 1996.

[27]
J. Wagemans. Detection of Visual Symmetries. In C.W. Tyler, editor, Human Symmetry Perception and its Computational Analysis, pages 25--48. VSP, The Netherlands, 1996.

[28]
J. Yan. A Note on Proactive Password Checking. ACM New Security Paradigms Workshop, New Mexico, USA, 2001. http://citeseer.nj.nec.com/yan01note.html, site accessed Jan. 12, 2004.

Previous Up