咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 38 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 119 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 99 篇 计算机科学与技术...
    • 32 篇 电气工程
    • 18 篇 信息与通信工程
    • 16 篇 软件工程
    • 6 篇 控制科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 4 篇 教育学
    • 4 篇 心理学(可授教育学...
    • 1 篇 教育学
  • 4 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 基础医学(可授医学...
  • 2 篇 法学
    • 2 篇 社会学

主题

  • 119 篇 graphical passwo...
  • 52 篇 authentication
  • 25 篇 security
  • 23 篇 usable security
  • 19 篇 user authenticat...
  • 10 篇 usability
  • 8 篇 human factors
  • 6 篇 passwords
  • 6 篇 password securit...
  • 6 篇 mobile security
  • 5 篇 shoulder surfing
  • 5 篇 textual password...
  • 4 篇 shoulder-surfing
  • 4 篇 shoulder surfing...
  • 4 篇 sociocultural ex...
  • 4 篇 memorability
  • 4 篇 information secu...
  • 4 篇 biometrics
  • 3 篇 pattern lock
  • 3 篇 user study

机构

  • 7 篇 carleton univ sc...
  • 4 篇 univ cyprus nico...
  • 4 篇 univ patras dept...
  • 3 篇 cognit ux gmbh h...
  • 3 篇 univ patras patr...
  • 3 篇 city univ hong k...
  • 3 篇 rhodes univ grah...
  • 2 篇 univ patras dept...
  • 2 篇 nelson mandela m...
  • 2 篇 cognit ux ltd ni...
  • 2 篇 univ cyprus dept...
  • 2 篇 natl tsing hua u...
  • 2 篇 tech univ denmar...
  • 2 篇 carleton univ hu...
  • 2 篇 citard serv ltd ...
  • 2 篇 tcs research pun...
  • 1 篇 univ panamerican...
  • 1 篇 univ maryland ba...
  • 1 篇 tcs research ahm...
  • 1 篇 sathyabama univ ...

作者

  • 10 篇 fidas christos
  • 8 篇 belk marios
  • 7 篇 pitsillides andr...
  • 7 篇 chiasson sonia
  • 6 篇 biddle robert
  • 6 篇 van oorschot p. ...
  • 6 篇 constantinides a...
  • 4 篇 meng weizhi
  • 4 篇 forget alain
  • 3 篇 banahatti vijaya...
  • 3 篇 thorpe julie
  • 3 篇 sachin lodha
  • 3 篇 nicholson james
  • 3 篇 avouris nikolaos
  • 3 篇 li wenjuan
  • 3 篇 vijayanand banah...
  • 3 篇 lodha sachin
  • 3 篇 katsini christin...
  • 2 篇 yang gi-chul
  • 2 篇 kwok lam-for

语言

  • 113 篇 英文
  • 4 篇 其他
  • 1 篇 葡萄牙文
  • 1 篇 中文
检索条件"主题词=Graphical Passwords"
119 条 记 录,以下是1-10 订阅
排序:
graphical passwords: A Qualitative Study of Password Patterns  10
Graphical Passwords: A Qualitative Study of Password Pattern...
收藏 引用
10th International Conference on Cyber Warfare and Security (ICCWS)
作者: Vorster, Jo van Heerden, Renier Univ Liverpool Liverpool L69 3BX Merseyside England CSIR Informat Warfare ZA-0001 Pretoria South Africa Rhodes Univ Grahamstown South Africa
graphical passwords schemas are becoming more main-stream. There are many different approaches to graphical passwords, each with its own drawbacks and advantages. There has been many studies to suggest that graphical ... 详细信息
来源: 评论
graphical passwords - A Discussion  30
Graphical Passwords - A Discussion
收藏 引用
30th IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA)
作者: Kayem, Anne V. D. M. Univ Cape Town Dept Comp Sci ZA-7701 Cape Town South Africa
Authentications, on web applications and service platforms such as the ones that enable collaborative information sharing and resource management, are typically handled via text-based passwords. From a security usabil... 详细信息
来源: 评论
graphical passwords IMPLIES ON TOLERANCE PASSWORD, IMAGE CHOICE, AND PUZZLE LOGIN SECURITY
GRAPHICAL PASSWORDS IMPLIES ON TOLERANCE PASSWORD, IMAGE CHO...
收藏 引用
International Conference on Information Communication and Embedded Systems (ICICES)
作者: Gunaseeli, L. Canessane, R. Aroul Sathyabama Univ Sch Comp Madras Tamil Nadu India
In this proposed scheme, we presenting a new-fangled security primordial using on firm AI harms click spell, It may nothing only tries equal to progress together and make it to defence as well as using of puzzle. The ... 详细信息
来源: 评论
User interface design affects security: patterns in click-based graphical passwords
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2009年 第6期8卷 387-398页
作者: Chiasson, Sonia Forget, Alain Biddle, Robert van Oorschot, P. C. Carleton Univ Sch Comp Sci Ottawa ON K1S 5B6 Canada Carleton Univ Human Oriented Technol Lab Ottawa ON K1S 5B6 Canada
Design of the user interface for authentication systems influences users and may encourage either secure or insecure behaviour. Using data from four different but closely related click-based graphical password studies... 详细信息
来源: 评论
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones
收藏 引用
COMPUTERS & SECURITY 2017年 65卷 213-229页
作者: Meng, Weizhi Li, Wenjuan Kwok, Lam-For Choo, Kim-Kwang Raymond Tech Univ Denmark Dept Appl Math & Comp Sci Lyngby Denmark City Univ Hong Kong Dept Comp Sci Hong Kong Hong Kong Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX USA
graphical passwords (GPs) are recognised as one of the potential alternatives in addressing the limitations in conventional text-based password authentication. With the rapid development of mobile devices (i.e., the i... 详细信息
来源: 评论
Investigating the Viability of Multifactor graphical passwords for User Authentication
收藏 引用
INFORMATION SECURITY JOURNAL 2014年 第1-2期23卷 10-21页
作者: Jali, Mohd Zalisham Furnell, Steven M. Dowland, Paul S. USIM Fac Sci Technol Bandar Baru Nilai 71800 Negeri Sembilan Malaysia Univ Plymouth Ctr Secur Commun & Network Res CSCAN Plymouth Devon England Edith Cowan Univ Sch Comp & Secur Sci Perth WA Australia
Authentication using images (i.e., graphical passwords) is claimed to be one of the alternatives for overcoming weaknesses in the traditional username and password authentication. This paper reports on the study to ex... 详细信息
来源: 评论
Exploiting predictability in click-based graphical passwords
收藏 引用
JOURNAL OF COMPUTER SECURITY 2011年 第4期19卷 669-702页
作者: van Oorschot, P. Thorpe, Julie Carleton Univ Sch Comp Sci Ottawa ON Canada Univ Ontario Inst Technol Fac Business & Informat Technol Oshawa ON Canada
We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploi... 详细信息
来源: 评论
The Presentation Effect on graphical passwords  14
The Presentation Effect on Graphical Passwords
收藏 引用
32nd Annual ACM Conference on Human Factors in Computing Systems (CHI)
作者: Thorpe, Julie Al-Badawi, Muath MacRae, Brent Salehi-Abari, Amirali Univ Ontario Inst Technol Oshawa ON Canada Univ Toronto Dept Comp Sci Toronto ON Canada
We provide a simple yet powerful demonstration of how an unobtrusive change to a graphical password interface can modify the distribution of user chosen passwords, and thus possibly the security it provides. The only ... 详细信息
来源: 评论
TwoStep: An Authentication Method Combining Text and graphical passwords
TwoStep: An Authentication Method Combining Text and Graphic...
收藏 引用
4th International MCETECH Conference on e-Technologies
作者: van Oorschot, P. C. Wan, Tao Carleton Univ Sch Comp Sci Ottawa ON K1S 5B6 Canada
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords ill favor of memorability, as well as phishing attacks. Many recognition-based graphical password schemes alone, in o... 详细信息
来源: 评论
Do Background Images Improve "Draw a Secret" graphical passwords?
Do Background Images Improve "Draw a Secret" Graphical Passw...
收藏 引用
14th ACM Conference on Computer and Communication Security
作者: Dunphy, Paul Yan, Jeff Newcastle Univ Sch Comp Sci Newcastle Upon Tyne NE1 7RU Tyne & Wear England
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical analysis suggests that DAS supports an overall password space larger than that of the ubiquitous textual password scheme. However... 详细信息
来源: 评论