Graphical password authentication using cued click points

S Chiasson, PC Van Oorschot, R Biddle - Computer Security–ESORICS …, 2007 - Springer
We propose and examine the usability and security of Cued Click Points (CCP), a cued-
recall graphical password technique. Users click on one point per image for a sequence of …

Authentication using graphical passwords: Effects of tolerance and image choice

S Wiedenbeck, J Waters, JC Birget, A Brodskiy… - Proceedings of the …, 2005 - dl.acm.org
Graphical passwords are an alternative to alphanumeric passwords in which users click on
images to authenticate themselves rather than type alphanumeric strings. We have …

Design and evaluation of a shoulder-surfing resistant graphical password scheme

S Wiedenbeck, J Waters, L Sobrado… - Proceedings of the …, 2006 - dl.acm.org
When users input their passwords in a public place, they may be at risk of attackers stealing
their password. An attacker can capture a password by direct observation or by recording …

Exploring usability effects of increasing security in click-based graphical passwords

E Stobert, A Forget, S Chiasson… - Proceedings of the 26th …, 2010 - dl.acm.org
Graphical passwords have been proposed to address known problems with traditional text
passwords. For example, memorable user-chosen text passwords are predictable, but …

A second look at the usability of click-based graphical passwords

S Chiasson, R Biddle, PC Van Oorschot - Proceedings of the 3rd …, 2007 - dl.acm.org
Click-based graphical passwords, which involve clicking a set of user-selected points, have
been proposed as a usable alternative to text passwords. We conducted two user studies …

[PDF][PDF] Pass-go: A proposal to improve the usability of graphical passwords.

H Tao, C Adams - Int. J. Netw. Secur., 2008 - Citeseer
Inspired by an old Chinese game, Go, we have designed a new graphical password
scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a …

Click passwords under investigation

K Gołofit - Computer Security–ESORICS 2007: 12th European …, 2007 - Springer
The paper explores one of the graphical authentication techniques as the possible solution
to the most important problems of traditional passwords. The aim of this work is to bring …

[PDF][PDF] A Shoulder-Surfing Resistant Graphical Password Scheme-Wiw.

S Man, D Hong, MM Matthews - Security and Management, 2003 - researchgate.net
We propose a new graphical password scheme. It is defined as a challenge-response
identification. Hence, a password in our scheme is time-variant. User who knows the …

[PDF][PDF] A survey on the use of graphical passwords in security.

H Gao, W Jia, F Ye, L Ma - J. Softw., 2013 - jsoftware.us
Beginning around 1996, numerous graphical password schemes have been proposed,
motivated by improving password usability and security, two key factors in password scheme …

Graphical passwords: A survey

X Suo, Y Zhu, GS Owen - 21st Annual Computer Security …, 2005 - ieeexplore.ieee.org
The most common computer authentication method is to use alphanumerical usernames
and passwords. This method has been shown to have significant drawbacks. For example …