Next: Random Art
Up: Déjà Vu: A User
Previous: Acknowledgments
References
- And94
-
Ross J. Anderson.
Why Cryptosystems Fail.
Communications of the ACM, 37(11):32-40, November 1994.
- Art99
-
ID Arts.
https://www.id-arts.com/technology/papers/, 1999.
- AS99
-
Anne Adams and Martina Angela Sasse.
Users are not the enemy: Why users compromise computer security
mechanisms and how to take remedial measures.
Communications of the ACM, 42(12):40-46, December 1999.
- Bau98
-
Andrej Bauer.
Gallery of random art.
WWW at https://andrej.com/art/, 1998.
- Bel93
-
W. Belgers.
Unix password security, 1993.
- Blo96
-
G. Blonder.
United states patent, 1996.
United States Patent 5559961.
- CB94
-
B. Cheswick and S. Bellovin.
Firewalls and internet security: Repelling the wily hacker, 1994.
- Dha00
-
Rachna Dhamija.
Hash visualization in user authentication.
In Proceedings of the Computer Human Interaction 2000
Conference, April 2000.
- DP89
-
D. W. Davies and W. L. Price.
Security for Computer Networks.
John Wiley and Sons, 1989.
- EHMS99
-
Carl Ellison, Chris Hall, Randy Milbert, and Bruce Schneier.
Protecting secret keys with personal entropy.
to appear in Future Generation Computer Systems, 1999.
- FK89
-
D. C. Feldmeier and P. R. Karn.
UNIX password security--ten years later (invited), 1989.
Lecture Notes in Computer Science Volume 435.
- Gol96
-
Ian Goldberg.
Visual key fingerprint code.
Available at https://www.cs.berkeley.edu/iang/visprint.c, 1996.
- Hab70
-
Ralph Norman Haber.
How we remember what we see.
Scientific American, 222(5):104-112, May 1970.
- Int80
-
Helene Intraub.
Presentation rate and the representation of briefly glimpsed pictures
in memory.
Journal of Experimental Psychology: Human Learning and Memory,
6(1):1-12, 1980.
- JMM99
-
Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin.
The design and analysis of graphical passwords.
In Proceedings of the 8th USENIX Security Symposium, August
1999.
- Kle90
-
Daniel Klein.
A survey of, and improvements to, password security.
In Proceedings of the USENIX Second Security Workshop, Portland,
Oregon, 1990.
- Kni94
-
The Knightmare.
Secrets of a Super Hacker.
Loompanics Unlimited, Port Townsend, Washington, 1994.
- Lev96
-
Raph Levien.
Pgp snowflake.
Personal communication, 1996.
- Man96
-
Udi Manber.
A simple scheme to make passwords based on one-way functions much
harder to crack.
Computers and Security, 15(2):171-176, 1996.
- MT79
-
R. Morris and K. Thompson.
Password security: A case history.
Communications of the ACM, 22(11), Nov 1979.
- Muf92
-
D. Muffett.
Crack: A sensible password checker for unix, 1992.
A document distributed with the Crack 4.1 software package.
- Nie93
-
Jakob Nielsen.
Usability Engineering.
Academic Press, 1993.
- NP97
-
M. Naor and B. Pinkas.
Visual authentication and identification.
In Burt Kaliski, editor, Advances in Cryptology - Crypto '97,
pages 322-336, Berlin, 1997. Springer-Verlag.
Lecture Notes in Computer Science Volume 1294.
- NS95
-
M. Naor and A. Shamir.
Visual cryptography.
In Alfredo De Santis, editor, Advances in Cryptology - EuroCrypt
'94, pages 1-12, Berlin, 1995. Springer-Verlag.
Lecture Notes in Computer Science Volume 950.
- Pas00
-
Passlogix.
v-go.
WWW at https://www.passlogix.com/, 2000.
- PC69
-
A. Paivio and K. Csapo.
Concrete image and verbal memory codes.
Journal of Experimental Psychology, 80(2):279-285, 1969.
- PS99
-
Adrian Perrig and Dawn Song.
Hash visualization: A new technique to improve real-world security.
In Proceedings of the 1999 International Workshop on
Cryptographic Techniques and E-Commerce (CryTEC '99), 1999.
- SCH70
-
L. Standing, J. Conezio, and R.N. Haber.
Perception and memory for pictures: Single-trial learning of 2500
visual stimuli.
Psychonomic Science, 19(2):73-74, 1970.
- Sim91
-
Karl Sims.
Artificial evolution for computer graphics.
In Thomas W. Sederberg, editor, Proceedings of the ACM
SIGGRAPH Conference on Computer Graphics (SIGGRAPH '91), pages 319-328,
Las Vegas, Nevada, USA, July 1991. ACM Press.
- SNS88
-
J. Steiner, C. Neuman, and J. Schiller.
Kerberos: An authentication service for open network systems.
In USENIX Conference Proceedings, pages 191-200, 1988.
- WT99
-
Alma Whitten and J. D. Tygar.
Why johnny can't encrypt: A usability evaluation of pgp 5.0.
In Proceedings of the 8th USENIX Security Symposium, August
1999.
Next: Random Art
Up: Déjà Vu: A User
Previous: Acknowledgments
Adrian Perrig
Thu Jun 15 15:16:10 PDT 2000