Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. G. Blonder. Graphical passwords. United States Patent 559961, 1996.
    2. K. Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09, 2005.
    3. A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Communications of the ACM, vol. 33, pp. 168-176, 2000.
    4. Real User Corporation (2007) PassfacesTM,http://http//:www.realuser.com.
    5. Brostoff S. and Sasse M.A. In People and Computers XIV – Usability or Else: Proceedings of HCI. Sunderland, U.K, 2000.
    6. Sobrado L. and Birget J. (2007) http://rutgersscholar.rutgers.edu/volume04/sobrbirg/sobrbi rg.htm.
    7. S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical password authentication using Cued Click Points,” in European Symposium On Research In Computer Security (ESORICS), LNCS 4734, September 2007, pp. 359–374.
    8. A. Forget, S. Chiasson, and R. Biddle, “Shoulder-surfing resistance with eye-gaze entry in click-based graphical passwords.” in ACM SIGCHI Conference on Human Factors in Computing Systems: Note (CHI), 2010
    9. A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
    10. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A.D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
    11. A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems,” International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 128–152, 2005.
    12. K. Renaud, “Guidelines for designing graphical authentication mechanism interfaces,” International Journal of Information and Computer Security, vol. 3, no. 1, pp. 60– 85, June 2009.
    13. K. Renaud, “Evaluating authentication mechanisms,” in Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds. O’Reilly Media, 2005, ch. 6, pp. 103–128.
    14. C. Herley, P. van Oorschot, and A. Patrick, “Passwords: If Were So Smart, Why Are We Still Using Them?” in Financial Cryptography and Data Security, LNCS 5628, Springer, 2009

Recent Article