Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. S. Sood, A. Sarje, and K. Singh, “Cryptanalysis of password authentication schemes: Current status and key issues,” in Methods and Models in Computer Science, 2009. ICM2CS 2009.Proceeding of International Conference on, Dec 2009, pp. 1–7.
    2. S. Gurav, L. Gawade, P. Rane, and N. Khochare, “Graphical password authentication: Cloud securing scheme,” in Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on, Jan 2014, pp. 479–483.
    3. K. Gilhooly, “Biometrics: Getting back to business,” Computerworld,May, vol. 9, 2005.
    4. R. Dhamija and A. Perrig, “Deja vu: A user study using images for authentication,” in Proceedings of the 9th conference on USENIX Security Symposium-Volume 9. USENIX Association, 2000, pp. 4–4.
    5. “Realuser,” http://www.realuser.com/.
    6. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proceedings of the 8th conference on USENIX Security Symposium-Volume 8. USENIX Association, 1999, pp. 1–1.
    7. S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Passpoints: Design and longitudinal evaluation of a graphical password system,” International Journal of Human-Computer Studies,vol. 63, no. 1-2, pp. 102–127, 2005.
    8. A. Paivio, T. Rogers, and P. Smythe, “Why are pictures easier to recall than words?” Psychonomic Science, 1968.
    9. D. Nelson, U. Reed, and J. Walling, “Picture superiority effect,”Journal of Experimental Psychology: Human Learning and Memory,vol. 3, pp. 485–497, 1977.
    10. S. Brostoff and M. Sasse, “Are passfaces more usable than passwords? a field trial investigation,” PEOPLE AND COMPUTERS,pp. 405–424, 2000.
    11. A. De Angeli, M. Coutts, L. Coventry, G. Johnson, D. Cameron,and M. Fischer, “Vip: a visual approach to user authentication,” in Proceedings of the Working Conference on Advanced Visual Interfaces.ACM, 2002, pp. 316–323.
    12. B. Ives, K. Walsh, and H. Schneider, “The domino effect of password reuse,” Communications of the ACM, vol. 47, no. 4, pp. 75–78,2004.
    13. J. Long and K. Mitnick, No Tech Hacking: A Guide to Social Engineering,Dumpster Diving, and Shoulder Surfing. Elsevier Science,2011.
    14. T. Kwon, S. Shin, and S. Na, “Covert attentional shoulder surfing:Human adversaries are more powerful than expected,” IEEETransactions on Systems, Man, and Cybernetics: Systems, vol. 44, no. 6,pp. 716–727, June 2014.
    15. “Google glass snoopers can steal your passcode with a glance,”http://www.wired.com/2014/06/google-glasssnoopers-cansteal-your-passcode-with-a-glance/
    16. M. Sasse, S. Brostoff, and D. Weirich, “Transforming the weakest linka human/computer interaction approach to usable and effective security,” BT technology journal, vol. 19, no. 3, pp. 122–131,2001.
    17. “Mobile marketing statistics compilation,” http://www.smartinsights.com/mobile marketing/mobilemarketing- analytics/mobile-marketingstatistics/.
    18. D. Hong, S. Man, B. Hawes, and M. Mathews, “A password scheme strongly resistant to spyware,” in Proceedings of International conference on security and management, 2004.
    19. D. Tan, P. Keyani, and M. Czerwinski, “Spyresistant keyboard: Towards more secure password entry on publicly observable touch screens,” in Proceedings of OZCHI-Computer-Human Interaction Special Interest Group (CHISIG) of Australia. Canberra, Australia:ACM Press. Citeseer, 2005.
    20. M. Kumar, T. Garfinkel, D. Boneh, and T. Winograd, “Reducing shoulder-surfing by using gazebased password entry,” in Proceedingsof the 3rd symposium on Usable privacy and security. ACM, 2007, pp. 13–19.

Recent Article