Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords

A Forget, S Chiasson, R Biddle - … of the SIGCHI Conference on Human …, 2010 - dl.acm.org
We present Cued Gaze-Points (CGP) as a shoulder-surfing resistant cued-recall graphical
password scheme where users gaze instead of mouse-click. This approach has several …

A new graphical password scheme resistant to shoulder-surfing

H Gao, Z Ren, X Chang, X Liu… - 2010 International …, 2010 - ieeexplore.ieee.org
Shoulder-surfing is a known risk where an attacker can capture a password by direct
observation or by recording the authentication session. Due to the visual interface, this …

Exploring usability effects of increasing security in click-based graphical passwords

E Stobert, A Forget, S Chiasson… - Proceedings of the 26th …, 2010 - dl.acm.org
Graphical passwords have been proposed to address known problems with traditional text
passwords. For example, memorable user-chosen text passwords are predictable, but …

Input precision for gaze-based graphical passwords

A Forget, S Chiasson, R Biddle - CHI'10 Extended Abstracts on Human …, 2010 - dl.acm.org
Click-based graphical passwords have been proposed as alternatives to text-based
passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can …

Usability and strength in click-based graphical passwords

E Stobert - CHI'10 Extended Abstracts on Human Factors in …, 2010 - dl.acm.org
Click-based graphical passwords have attractive usability properties, such as cueing and
good memorability. However, parameters such as image size and number of click-points in …

A robust frequency offset estimation scheme for OFDM systems

L Chun-guo, L Li-zhong… - 2010 Global Mobile …, 2010 - ieeexplore.ieee.org
In this paper, an improved carrier frequency offset estimation method which is less sensitive
to timing offset is proposed. The method is based on the carefully constructed frequency …

Methods and techniques to protect against shoulder surfing and phishing attacks

PP Shi - 2010 - spectrum.library.concordia.ca
Identity theft refers to the preparatory stage of acquiring and collecting someone else's
personal information for criminal purposes. During the past few years, a very large number …

[PDF][PDF] Poster: The MVP web-based framework for user studies in authentication

S Chiasson, C Deschamps, M Hlywa… - Symposium on Usable …, 2010 - academia.edu
Despite the ubiquity of password systems, knowledge-based authentication remains an
important and active research area. Many current systems have low security, and even then …

Techniques for Multistage A2 Lattice Structure Construction and Calculation Using Triangular Number (Tn) and Square Number (Sn)

I Syafalni, MFM Salleh - 2010 Second International Conference …, 2010 - ieeexplore.ieee.org
In this paper, the connection between triangular number (T n), square number (S n) for
construction and counting the A 2 lattice number in lattice vector quantization is presented …

[引用][C] Trade-offs in Click-based Graphical Passwords: Usability vs. Password Space