Check out the new USENIX Web site. next up previous
Next: About this document ... Up: On User Choice in Previous: Acknowledgments

Bibliography

1
T. Alley and M. Cunningham. Averaged faces are attractive, but very attractive faces are not average. In Psychological Science, 2, pages 123-125, 1991.

2
G. E. Blonder. Graphical password. US Patent 5559961, Lucent Technologies, Inc., Murray Hill, NJ, August 30, 1995.

3
S. Brostoff and M.. A. Sasse. Are Passfaces$^{\rm TM}$ more usable than passwords? A field trial investigation. In Proceedings of Human Computer Interaction, pages 405-424, 2000.

4
R. Dhamija and A. Perrig. Déjà vu: A user study using images for authentication. In Proceedings of the $9^{th}$ USENIX Security Symposium, August 2000.

5
D. Feldmeier and P. Karn. UNIX password security--Ten years later. In Advances in Cryptology--CRYPTO '89 (Lecture Notes in Computer Science 435), 1990.

6
A. Feingold. Good-looking people are not what we think. In Psychological Bulletin, 111, pages 304-341, 1992.

7
W. Jansen, S. Gavrila, V. Korolev, R. Ayers, and R. Swanstrom. Picture password: A visual login technique for mobile devices. NISTIR 7030, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, July 2003. Available at https://csrc.nist.gov/publications/nistir/nistir-7030.pdf.

8
I. Jermyn, A. Mayer, F. Monrose, M. Reiter and A. Rubin. The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium, August 1999.

9
D. Klein. Foiling the cracker: A survey of, and improvements to, password security. In Proceedings of the $2^{nd}$ USENIX Security Workshop, pages 5-14, August 1990.

10
J. Langlois, L. Kalakanis, A. Rubenstein, A. Larson, M. Hallam, and M. Smoot. Maxims and myths of beauty: A meta-analytic and theoretical review. In Psychological Bulletin 126:390-423, 2000.

11
D. Levin. Race as a visual feature: using visual search and perceptual discrimination tasks to understand face categories and the cross race recognition deficit. Quarterly Journal of Experimental Psychology:General, 129 (4), 559-574.

12
D. Lindsay, P. Jack, and M. Chrisitan. Other-race face perception. Journal of Applied Psychology 76:587-589, 1991.

13
T. Luce. Blacks, whites and yellows: They all look alike to me. Psychology Today 8:105-108, 1974.

14
S. Madigan. Picture memory. In Imagery, Memory, and Cognition, pages 65-86, Lawrence Erlbaum Associates, 1983.

15
R. S. Malpass. They all look alike to me. In The Undaunted Psychologist, pages 74-88, McGraw-Hill, 1992.

16
C. Manning and H. Schütze. Foundations of Statistical Natural Language Processing, Chapter 6, MIT Press, May 1999.

17
A. M. Martinez and R. Benavente. The AR Face Database. Technical Report number 24, June, 1998.

18
J. L. Massey. Guessing and entropy. In Proceedings of the 1994 IEEE International Symposium on Information Theory, 1994.

19
R. J. McEliece and Z. Yu. An inequality on entropy. In Proceedings of the 1995 IEEE International Symposium on Information Theory, 1995.

20
C. Meissner, J. Brigham. Thirty years of investigation the own-race advantage in memory for faces: A meta-analytic review. Psychology, Public Policy & Law, 7, pages 3-35, 2001.

21
G. A. Miller. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review 63:81-97, 1956.

22
R. Morris and K. Thompson. Password security: A case history. Communications of the ACM 22(11):594-597, November 1979.

23
D. L. Nelson, U. S. Reed, and J. R. Walling. Picture superiority effect. Journal of Experimental Psychology: Human Learning and Memory, 3:485-497, 1977.

24
The Science Behind Passfaces. Revision 2, Real User Corporation, September 2001. Available at https://www.realuser.com/published/ScienceBehindPassfaces.pdf.

25
Strategies for using Passfaces$^{\rm TM}$ for Windows. Real User Corporation, 2002. Available at https://www.realuser.com/published/PassfacesforWindowsStrategies.pdf.

26
Asian Face Image Database PF01. Pohang University of Science and Technology, Korea, 2001.

27
T. Valentine. An evaluation of the Passfaces$^{\rm TM}$ personal authentication system. Technical Report, Goldsmiths College University of London, 1998.

28
T. Valentine. Memory for Passfaces$^{\rm TM}$ after a long delay. Technical Report, Goldsmiths College University of London, 1999.

29
T. Valentine and M. Endo. Towards an exemplar model of face processing: The effects of race and distinctiveness. Quarterly Journal of Experimental Psychology 44, 671-703.

30
Visual Key - Technology. Available at https://www.viskey.com/tech.html.

31
P. Walker and W. Tanaka. An encoding advantage for own-race versus other-race faces. In Perception, 23, pages 1117-1125, 2003.

32
T. Wu. A real-world analysis of Kerberos password security. In Proceedings of the 1999 ISOC Symposium on Network and Distributed System Security, February 1999.

33
M. Zviran and W. J. Haga. Cognitive passwords: The key to easy access and control. Computers and Security 9(8):723-736, 1990.

34
M. Zviran and W. J. Haga. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal 36(3):227-237, 1993.