Towards Usable Solutions to Graphical Password Hotspot Problem
Citations
914 citations
Cites background from "Towards Usable Solutions to Graphic..."
..., GPI/GPIS [48] (Graphical Password with Icons/with Icons suggested by System) has users select 6 ordered icons from a panel of 150 (for 2 possible passwords), while Déjà Vu [49] has users recognize 5 random art images from a panel of 25 (for 2 possible...
[...]
635 citations
Cites background from "Towards Usable Solutions to Graphic..."
...…issues, include password rules or policies [Morris and Thompson 1979] disallowing weak passwords at creation, systems that encourage stronger password choices [Chiasson et al. 2008a; Bicakci et al. 2009a], and both reactive and proactive password checkers [Klein 1990; Bergadano et al. 1998]....
[...]
...Other defenses, especially important for graphical password schemes subject userchoice issues, include password rules or policies [Morris and Thompson 1979] disallowing weak passwords at creation, systems that encourage stronger password choices [Chiasson et al. 2008a; Bicakci et al. 2009a], and both reactive and proactive password checkers [Klein 1990; Bergadano et al....
[...]
72 citations
Cites background from "Towards Usable Solutions to Graphic..."
...User-chosen graphical passwords were predictable (van Oorschot and Thorpe, 2008) and/or tended to concentrate on several hotspots on the images (Dirik et al., 2007; Thorpe and van Oorschot, 2007; Bicakci et al., 2009)....
[...]
66 citations
63 citations
Cites result from "Towards Usable Solutions to Graphic..."
...Our evaluation results show the proposed approach could crack a considerable portion of collected picture passwords under different settings....
[...]
References
1,774 citations
870 citations
"Towards Usable Solutions to Graphic..." refers background in this paper
...RELATED WORK AND PROBLEM DEFINITION Previous work on click-based graphical password schemes can be studied in two groups....
[...]
713 citations
"Towards Usable Solutions to Graphic..." refers background or methods in this paper
...Figure 6....
[...]
...Number of attempts to remember the correct password is presented in Figure 4....
[...]
...Figure 6 presents the number of regions with respect to number of times clicked by users for the PassPoints interface....
[...]
...In Passpoints interface (Figure 2), the background image is 451x331 pixels in size and users are asked to select and mouse-click a sequence of five points as their passwords, and confirm it by clicking inside a tolerance circle of 19 pixels centered on the original click-points....
[...]
...Each participant either used GPI, GPIS (Figure 1) or PassPoints (Figure 2) interface....
[...]
542 citations
"Towards Usable Solutions to Graphic..." refers background in this paper
...We also thank anonymous reviewers for their suggestions for improving the paper....
[...]
509 citations
"Towards Usable Solutions to Graphic..." refers background in this paper
...RELATED WORK AND PROBLEM DEFINITION Previous work on click-based graphical password schemes can be studied in two groups....
[...]