 
 
 
 
 
 
   
 Next: A Picture is Worth
 Up: The Design and Analysis
 Previous: Acknowledgement
 
- 1
-  A. Alvare.  How crackers crack passwords or
what passwords to avoid.  In Proceedings of the 2nd
USENIX Security Workshop, August 1990.
- 2
-  M. Bishop. Password management. In 
Proceedings of COMPCON '91, pages 167-169, February 1991.
- 3
-  M. Bishop. Improving system security via
proactive password checking. Computers and Security,
14(3):233-249, April 1995.
- 4
-  G. Blonder.  Graphical passwords.  United
States Patent 5559961, 1996.
- 5
-  G. H. Bower, M. B. Karlin, and A. Dueck.
Comprehension and memory for pictures.  Memory and
Cognition, 2:216-220, 1975.
- 6
-  M. A. Borges, M. A. Stepnowsky, and L. H. Holt.
Recall and recognition of words and pictures by adults and
children. Bulletin of the Psychonomic Society, 9:113-114,
1977.
- 7
-  M. W. Calkins.  Short studies in memory and
association from the Wellesley College Laboratory.  
Psychological Review, 5:451-462, 1898.
- 8
-  T. M. Cover,and J. A. Thomas. Elements of
Information Theory, John Wiley and Sons, 1991.
- 9
-  D. Feldmeier and P. Karn.  UNIX password security--Ten years later.  In Advances in Cryptology--CRYPTO '89
Proceedings (Lecture Notes in Computer Science 435), 1990.
- 10
-  S. Garfinkel and E. Spafford.  Practical
Unix & Internet Security. O'Reilly & Associates, Inc., 1996.
- 11
-  N. Haller.  The s/key(tm) one-time password
system.  In Proceedings of the 1994 Symposium on Network and
Distributed System Security, pages 151-157, February 1994.
- 12
-  D. Klein.  Foiling the cracker: A survey of,
and improvements to, password security.  In Proceedings of
the 2nd USENIX Security Workshop, August 1990.
- 13
-  F. Leclerc and R. Plamondon.  Automatic signature
verification: The state of the art--1989-1993.  
International Journal on Pattern Recognition and Artificial
Intelligence, 8(3):643-660, June 1994.
- 14
-  G. Lorette and R. Plamondon.  Dynamic approaches
to handwritten signature verification.  In Computer Processing of
Handwriting, pages 21-47, World Scientific, 1990.
- 15
-  S. Madigan. Picture memory.  In Imagery,
Memory, and Cognition, pages 65-86, Lawrence Erlbaum Associates,
1983.
- 16
-  U. Manber. A simple scheme to make passwords
based on one-way functions much harder to crack. Computers &
Security, 15(2):171-176, 1996.
- 17
-  G. Mandler. Your face looks familiar but I
can't remember your name: A review of dual process theory.  
Relating Theory and Data, 207-225, 1991.
- 18
-  G. A. Miller. The magical number seven, plus or
minus two: Some limits on our capacity for processing information.
Psychological Review, 63:81-97, 1956.
- 19
-  R. Morris and K. Thompson.  Password security: A
case history.  Communications of the ACM, 22(11):594-597,
November 1979.
- 20
-  A. Muffet. Crack: A sensible password checker
for Unix.  Available via anonymous ftp from cert.org.
- 21
-  V. S. Nalwa.  Automatic on-line signature
verification.  Proceedings of the IEEE, pages 215-239, February
1997.
- 22
-  D. L. Nelson, U. S. Reed, and J. R. Walling.
Picture superiority effect.  Journal of Experimental
Psychology: Human Learning and Memory, 3:485-497, 1977.
- 23
-  A. Paivio.  Imagery and Verbal Processes.
Holt, Rinehard, and Winston, New York, 1971.
- 24
-  A. Paivio.  Imagery in recall and recognition.
Recall and Recognition, John Wiley, New York, 1976.
- 25
-  A. Paivio, T. B. Rogers, and P. C. Smythe.  Why
are pictures easier to recall than words?  Psychonomic
Science, 11:137-138, 1968.
- 26
-  T. Raleigh and R. Underwood. CRACK: A
distributed password advisor. In Proceedings of the 1st
USENIX Security Workshop, pages 12-13, August, 1988.
- 27
-  R. N. Shepard. Recognition memory for words,
sentences, and pictures.  Journal of Verbal Learnings and
Verbal Behavior, 6: 156-163, 1967.
- 28
-  E. Spafford. Preventing weak password
choices. In Proceedings of the 14th National Computer
Security Conference, pages 446-455, October 1991.
- 29
-  E. Spafford. Observations on reusable password
choices.  In Proceedings of the 3rd USENIX Security
Symposium, September 1992.
- 30
-  L. Standing.  Learning 10,000 pictures. 
Quarterly Journal of Experimental Psychology, 25:207-222, 1973.
- 31
-  Cynthia J. Solomon and Seymour Papert.
A case study of a young child doing Turtle Graphics in LOGO.
MIT AI memo 375, July 1976.
- 32
-  J. E. Wells. Encoding and memory for verbal and
pictorial stimuli.  Journal of Experimental Psychology,
24:242-252, 1972.
- 33
-  Max Wertheimer. Laws of organization in perceptual
forms. A source book of Gestalt psychology (pp. 71-88). London:
Routledge & Kegan Paul. 1938.
- 34
-  T. Wu. A real-world analysis of Kerberos password
security. In Proceedings of the ISOC Symposium on Network and
Distributed System Security, 1999.