Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. J Thorpe, PC van Oorschot USENIX Security Symposium 8, 1-8, 2007 | 306 | 2007 |
Pass-thoughts: authenticating with our minds J Thorpe, PC Van Oorschot, A Somayaji Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005 | 259 | 2005 |
On semantic patterns of passwords and their security impact. R Veras, C Collins, J Thorpe NDSS, 2014 | 241 | 2014 |
Towards secure design choices for implementing graphical passwords J Thorpe, PC Van Oorschot 20th Annual Computer Security Applications Conference, 50-60, 2004 | 208* | 2004 |
Graphical Dictionaries and the Memorable Space of Graphical Passwords. J Thorpe, PC van Oorschot USENIX Security Symposium, 135-150, 2004 | 206 | 2004 |
Purely automated attacks on passpoints-style graphical passwords PC Van Oorschot, A Salehi-Abari, J Thorpe IEEE Transactions on Information Forensics and Security 5 (3), 393-405, 2010 | 176 | 2010 |
On predictive models and user-drawn graphical passwords PC Oorschot, J Thorpe ACM Transactions on Information and system Security (TISSEC) 10 (4), 1-33, 2008 | 162 | 2008 |
Exploiting predictability in click-based graphical passwords PC van Oorschot, J Thorpe Journal of Computer Security 19 (4), 669-702, 2011 | 149 | 2011 |
Analyzing user choice in graphical passwords D Nali, J Thorpe School of Computer Science, Carleton University, Tech. Rep. TR-04-01, 2004 | 145 | 2004 |
On purely automated attacks and click-based graphical passwords A Salehi-Abari, J Thorpe, PC Van Oorschot 2008 Annual Computer Security Applications Conference (ACSAC), 111-120, 2008 | 99 | 2008 |
Visualizing semantics in passwords: The role of dates R Veras, J Thorpe, C Collins Proceedings of the ninth international symposium on visualization for cyber …, 2012 | 98 | 2012 |
Usability and security evaluation of GeoPass: a geographic location-password scheme J Thorpe, B MacRae, A Salehi-Abari Proceedings of the Ninth symposium on usable privacy and security, 1-14, 2013 | 73 | 2013 |
The presentation effect on graphical passwords J Thorpe, M Al-Badawi, B MacRae, A Salehi-Abari proceedings of the SIGCHI conference on human factors in computing systems …, 2014 | 41 | 2014 |
On password behaviours and attitudes in different populations R Alomari, J Thorpe Journal of information security and applications 45, 79-89, 2019 | 31 | 2019 |
Systems, methods, and computer program products for providing video-passwords for user authentication JK Thorpe, A Salehi-Abari, RE Burden US Patent 8,966,614, 2015 | 31 | 2015 |
A large-scale analysis of the semantic password model and linguistic patterns in passwords R Veras, C Collins, J Thorpe ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-21, 2021 | 24 | 2021 |
Do Password Managers Nudge Secure (Random) Passwords? S Zibaei, DR Malapaya, B Mercier, A Salehi-Abari, J Thorpe Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS), 2022 | 21 | 2022 |
An exploration of geographic authentication schemes B MacRae, A Salehi-Abari, J Thorpe IEEE Transactions on Information Forensics and Security 11 (9), 1997-2012, 2016 | 21 | 2016 |
Reinforcing system-assigned passphrases through implicit learning Z Joudaki, J Thorpe, MV Martin Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 20 | 2018 |
On the security of graphical password schemes PC van Oorschot, J Thorpe Technical Report TR-05-11. Integration and extension of USENIX Security 2004 …, 2005 | 17 | 2005 |