Check out the new USENIX Web site. next up previous
Next: A Picture is Worth Up: The Design and Analysis Previous: Acknowledgement

References

1
A. Alvare. How crackers crack passwords or what passwords to avoid. In Proceedings of the 2nd USENIX Security Workshop, August 1990.

2
M. Bishop. Password management. In Proceedings of COMPCON '91, pages 167-169, February 1991.

3
M. Bishop. Improving system security via proactive password checking. Computers and Security, 14(3):233-249, April 1995.

4
G. Blonder. Graphical passwords. United States Patent 5559961, 1996.

5
G. H. Bower, M. B. Karlin, and A. Dueck. Comprehension and memory for pictures. Memory and Cognition, 2:216-220, 1975.

6
M. A. Borges, M. A. Stepnowsky, and L. H. Holt. Recall and recognition of words and pictures by adults and children. Bulletin of the Psychonomic Society, 9:113-114, 1977.

7
M. W. Calkins. Short studies in memory and association from the Wellesley College Laboratory. Psychological Review, 5:451-462, 1898.

8
T. M. Cover,and J. A. Thomas. Elements of Information Theory, John Wiley and Sons, 1991.

9
D. Feldmeier and P. Karn. UNIX password security--Ten years later. In Advances in Cryptology--CRYPTO '89 Proceedings (Lecture Notes in Computer Science 435), 1990.

10
S. Garfinkel and E. Spafford. Practical Unix & Internet Security. O'Reilly & Associates, Inc., 1996.

11
N. Haller. The s/key(tm) one-time password system. In Proceedings of the 1994 Symposium on Network and Distributed System Security, pages 151-157, February 1994.

12
D. Klein. Foiling the cracker: A survey of, and improvements to, password security. In Proceedings of the 2nd USENIX Security Workshop, August 1990.

13
F. Leclerc and R. Plamondon. Automatic signature verification: The state of the art--1989-1993. International Journal on Pattern Recognition and Artificial Intelligence, 8(3):643-660, June 1994.

14
G. Lorette and R. Plamondon. Dynamic approaches to handwritten signature verification. In Computer Processing of Handwriting, pages 21-47, World Scientific, 1990.

15
S. Madigan. Picture memory. In Imagery, Memory, and Cognition, pages 65-86, Lawrence Erlbaum Associates, 1983.

16
U. Manber. A simple scheme to make passwords based on one-way functions much harder to crack. Computers & Security, 15(2):171-176, 1996.

17
G. Mandler. Your face looks familiar but I can't remember your name: A review of dual process theory. Relating Theory and Data, 207-225, 1991.

18
G. A. Miller. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63:81-97, 1956.

19
R. Morris and K. Thompson. Password security: A case history. Communications of the ACM, 22(11):594-597, November 1979.

20
A. Muffet. Crack: A sensible password checker for Unix. Available via anonymous ftp from cert.org.

21
V. S. Nalwa. Automatic on-line signature verification. Proceedings of the IEEE, pages 215-239, February 1997.

22
D. L. Nelson, U. S. Reed, and J. R. Walling. Picture superiority effect. Journal of Experimental Psychology: Human Learning and Memory, 3:485-497, 1977.

23
A. Paivio. Imagery and Verbal Processes. Holt, Rinehard, and Winston, New York, 1971.

24
A. Paivio. Imagery in recall and recognition. Recall and Recognition, John Wiley, New York, 1976.

25
A. Paivio, T. B. Rogers, and P. C. Smythe. Why are pictures easier to recall than words? Psychonomic Science, 11:137-138, 1968.

26
T. Raleigh and R. Underwood. CRACK: A distributed password advisor. In Proceedings of the 1st USENIX Security Workshop, pages 12-13, August, 1988.

27
R. N. Shepard. Recognition memory for words, sentences, and pictures. Journal of Verbal Learnings and Verbal Behavior, 6: 156-163, 1967.

28
E. Spafford. Preventing weak password choices. In Proceedings of the 14th National Computer Security Conference, pages 446-455, October 1991.

29
E. Spafford. Observations on reusable password choices. In Proceedings of the 3rd USENIX Security Symposium, September 1992.

30
L. Standing. Learning 10,000 pictures. Quarterly Journal of Experimental Psychology, 25:207-222, 1973.

31
Cynthia J. Solomon and Seymour Papert. A case study of a young child doing Turtle Graphics in LOGO. MIT AI memo 375, July 1976.

32
J. E. Wells. Encoding and memory for verbal and pictorial stimuli. Journal of Experimental Psychology, 24:242-252, 1972.

33
Max Wertheimer. Laws of organization in perceptual forms. A source book of Gestalt psychology (pp. 71-88). London: Routledge & Kegan Paul. 1938.

34
T. Wu. A real-world analysis of Kerberos password security. In Proceedings of the ISOC Symposium on Network and Distributed System Security, 1999.