Next: A Picture is Worth
Up: The Design and Analysis
Previous: Acknowledgement
- 1
- A. Alvare. How crackers crack passwords or
what passwords to avoid. In Proceedings of the 2nd
USENIX Security Workshop, August 1990.
- 2
- M. Bishop. Password management. In
Proceedings of COMPCON '91, pages 167-169, February 1991.
- 3
- M. Bishop. Improving system security via
proactive password checking. Computers and Security,
14(3):233-249, April 1995.
- 4
- G. Blonder. Graphical passwords. United
States Patent 5559961, 1996.
- 5
- G. H. Bower, M. B. Karlin, and A. Dueck.
Comprehension and memory for pictures. Memory and
Cognition, 2:216-220, 1975.
- 6
- M. A. Borges, M. A. Stepnowsky, and L. H. Holt.
Recall and recognition of words and pictures by adults and
children. Bulletin of the Psychonomic Society, 9:113-114,
1977.
- 7
- M. W. Calkins. Short studies in memory and
association from the Wellesley College Laboratory.
Psychological Review, 5:451-462, 1898.
- 8
- T. M. Cover,and J. A. Thomas. Elements of
Information Theory, John Wiley and Sons, 1991.
- 9
- D. Feldmeier and P. Karn. UNIX password security--Ten years later. In Advances in Cryptology--CRYPTO '89
Proceedings (Lecture Notes in Computer Science 435), 1990.
- 10
- S. Garfinkel and E. Spafford. Practical
Unix & Internet Security. O'Reilly & Associates, Inc., 1996.
- 11
- N. Haller. The s/key(tm) one-time password
system. In Proceedings of the 1994 Symposium on Network and
Distributed System Security, pages 151-157, February 1994.
- 12
- D. Klein. Foiling the cracker: A survey of,
and improvements to, password security. In Proceedings of
the 2nd USENIX Security Workshop, August 1990.
- 13
- F. Leclerc and R. Plamondon. Automatic signature
verification: The state of the art--1989-1993.
International Journal on Pattern Recognition and Artificial
Intelligence, 8(3):643-660, June 1994.
- 14
- G. Lorette and R. Plamondon. Dynamic approaches
to handwritten signature verification. In Computer Processing of
Handwriting, pages 21-47, World Scientific, 1990.
- 15
- S. Madigan. Picture memory. In Imagery,
Memory, and Cognition, pages 65-86, Lawrence Erlbaum Associates,
1983.
- 16
- U. Manber. A simple scheme to make passwords
based on one-way functions much harder to crack. Computers &
Security, 15(2):171-176, 1996.
- 17
- G. Mandler. Your face looks familiar but I
can't remember your name: A review of dual process theory.
Relating Theory and Data, 207-225, 1991.
- 18
- G. A. Miller. The magical number seven, plus or
minus two: Some limits on our capacity for processing information.
Psychological Review, 63:81-97, 1956.
- 19
- R. Morris and K. Thompson. Password security: A
case history. Communications of the ACM, 22(11):594-597,
November 1979.
- 20
- A. Muffet. Crack: A sensible password checker
for Unix. Available via anonymous ftp from cert.org.
- 21
- V. S. Nalwa. Automatic on-line signature
verification. Proceedings of the IEEE, pages 215-239, February
1997.
- 22
- D. L. Nelson, U. S. Reed, and J. R. Walling.
Picture superiority effect. Journal of Experimental
Psychology: Human Learning and Memory, 3:485-497, 1977.
- 23
- A. Paivio. Imagery and Verbal Processes.
Holt, Rinehard, and Winston, New York, 1971.
- 24
- A. Paivio. Imagery in recall and recognition.
Recall and Recognition, John Wiley, New York, 1976.
- 25
- A. Paivio, T. B. Rogers, and P. C. Smythe. Why
are pictures easier to recall than words? Psychonomic
Science, 11:137-138, 1968.
- 26
- T. Raleigh and R. Underwood. CRACK: A
distributed password advisor. In Proceedings of the 1st
USENIX Security Workshop, pages 12-13, August, 1988.
- 27
- R. N. Shepard. Recognition memory for words,
sentences, and pictures. Journal of Verbal Learnings and
Verbal Behavior, 6: 156-163, 1967.
- 28
- E. Spafford. Preventing weak password
choices. In Proceedings of the 14th National Computer
Security Conference, pages 446-455, October 1991.
- 29
- E. Spafford. Observations on reusable password
choices. In Proceedings of the 3rd USENIX Security
Symposium, September 1992.
- 30
- L. Standing. Learning 10,000 pictures.
Quarterly Journal of Experimental Psychology, 25:207-222, 1973.
- 31
- Cynthia J. Solomon and Seymour Papert.
A case study of a young child doing Turtle Graphics in LOGO.
MIT AI memo 375, July 1976.
- 32
- J. E. Wells. Encoding and memory for verbal and
pictorial stimuli. Journal of Experimental Psychology,
24:242-252, 1972.
- 33
- Max Wertheimer. Laws of organization in perceptual
forms. A source book of Gestalt psychology (pp. 71-88). London:
Routledge & Kegan Paul. 1938.
- 34
- T. Wu. A real-world analysis of Kerberos password
security. In Proceedings of the ISOC Symposium on Network and
Distributed System Security, 1999.