Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

[PDF][PDF] Smudge attacks on smartphone touch screens

AJ Aviv, K Gibson, E Mossop, M Blaze… - 4th USENIX workshop on …, 2010 - usenix.org
Touch screens are an increasingly common feature on personal computing devices,
especially smartphones, where size and user interface advantages accrue from …

Quantifying the security of graphical passwords: The case of android unlock patterns

S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …

[PDF][PDF] A framework for reasoning about the human in the loop

LF Cranor - 2008 - usenix.org
Many secure systems rely on a “human in the loop” to perform security-critical functions.
However, humans often fail in their security roles. Whenever possible, secure system …

An unbiased offline evaluation of contextual bandit algorithms with generalized linear models

L Li, W Chu, J Langford, T Moon… - Proceedings of the …, 2012 - proceedings.mlr.press
Contextual bandit algorithms have become popular tools in online recommendation and
advertising systems.\emphOffline evaluation of the effectiveness of new algorithms in these …

Graphical password authentication using cued click points

S Chiasson, PC Van Oorschot, R Biddle - Computer Security–ESORICS …, 2007 - Springer
We propose and examine the usability and security of Cued Click Points (CCP), a cued-
recall graphical password technique. Users click on one point per image for a sequence of …

[PDF][PDF] The Password Thicket: Technical and Market Failures in Human Authentication on the Web.

J Bonneau, S Preibusch - WEIS, 2010 - jbonneau.com
We report the results of the first large-scale empirical analysis of password implementations
deployed on the Internet. Our study included 150 websites which offer free user accounts for …

Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

S Chiasson, E Stobert, A Forget… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …

Modeling user choice in the PassPoints graphical password scheme

AE Dirik, N Memon, JC Birget - Proceedings of the 3rd symposium on …, 2007 - dl.acm.org
We develop a model to identify the most likely regions for users to click in order to create
graphical passwords in the PassPoints system. A PassPoints password is a sequence of …

Do background images improve" draw a secret" graphical passwords?

P Dunphy, J Yan - Proceedings of the 14th ACM conference on …, 2007 - dl.acm.org
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical
analysis suggests that DAS supports an overall password space larger than that of the …