Check out the new USENIX Web site. next up previous
Next: Random Art Up: Déjà Vu: A User Previous: Acknowledgments

References

And94
Ross J. Anderson. Why Cryptosystems Fail. Communications of the ACM, 37(11):32-40, November 1994.

Art99
ID Arts. https://www.id-arts.com/technology/papers/, 1999.

AS99
Anne Adams and Martina Angela Sasse. Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM, 42(12):40-46, December 1999.

Bau98
Andrej Bauer. Gallery of random art. WWW at https://andrej.com/art/, 1998.

Bel93
W. Belgers. Unix password security, 1993.

Blo96
G. Blonder. United states patent, 1996. United States Patent 5559961.

CB94
B. Cheswick and S. Bellovin. Firewalls and internet security: Repelling the wily hacker, 1994.

Dha00
Rachna Dhamija. Hash visualization in user authentication. In Proceedings of the Computer Human Interaction 2000 Conference, April 2000.

DP89
D. W. Davies and W. L. Price. Security for Computer Networks. John Wiley and Sons, 1989.

EHMS99
Carl Ellison, Chris Hall, Randy Milbert, and Bruce Schneier. Protecting secret keys with personal entropy. to appear in Future Generation Computer Systems, 1999.

FK89
D. C. Feldmeier and P. R. Karn. UNIX password security--ten years later (invited), 1989. Lecture Notes in Computer Science Volume 435.

Gol96
Ian Goldberg. Visual key fingerprint code. Available at https://www.cs.berkeley.edu/iang/visprint.c, 1996.

Hab70
Ralph Norman Haber. How we remember what we see. Scientific American, 222(5):104-112, May 1970.

Int80
Helene Intraub. Presentation rate and the representation of briefly glimpsed pictures in memory. Journal of Experimental Psychology: Human Learning and Memory, 6(1):1-12, 1980.

JMM+99
Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin. The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium, August 1999.

Kle90
Daniel Klein. A survey of, and improvements to, password security. In Proceedings of the USENIX Second Security Workshop, Portland, Oregon, 1990.

Kni94
The Knightmare. Secrets of a Super Hacker. Loompanics Unlimited, Port Townsend, Washington, 1994.

Lev96
Raph Levien. Pgp snowflake. Personal communication, 1996.

Man96
Udi Manber. A simple scheme to make passwords based on one-way functions much harder to crack. Computers and Security, 15(2):171-176, 1996.

MT79
R. Morris and K. Thompson. Password security: A case history. Communications of the ACM, 22(11), Nov 1979.

Muf92
D. Muffett. Crack: A sensible password checker for unix, 1992. A document distributed with the Crack 4.1 software package.

Nie93
Jakob Nielsen. Usability Engineering. Academic Press, 1993.

NP97
M. Naor and B. Pinkas. Visual authentication and identification. In Burt Kaliski, editor, Advances in Cryptology - Crypto '97, pages 322-336, Berlin, 1997. Springer-Verlag. Lecture Notes in Computer Science Volume 1294.

NS95
M. Naor and A. Shamir. Visual cryptography. In Alfredo De Santis, editor, Advances in Cryptology - EuroCrypt '94, pages 1-12, Berlin, 1995. Springer-Verlag. Lecture Notes in Computer Science Volume 950.

Pas00
Passlogix. v-go. WWW at https://www.passlogix.com/, 2000.

PC69
A. Paivio and K. Csapo. Concrete image and verbal memory codes. Journal of Experimental Psychology, 80(2):279-285, 1969.

PS99
Adrian Perrig and Dawn Song. Hash visualization: A new technique to improve real-world security. In Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce (CryTEC '99), 1999.

SCH70
L. Standing, J. Conezio, and R.N. Haber. Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychonomic Science, 19(2):73-74, 1970.

Sim91
Karl Sims. Artificial evolution for computer graphics. In Thomas W. Sederberg, editor, Proceedings of the ACM SIGGRAPH Conference on Computer Graphics (SIGGRAPH '91), pages 319-328, Las Vegas, Nevada, USA, July 1991. ACM Press.

SNS88
J. Steiner, C. Neuman, and J. Schiller. Kerberos: An authentication service for open network systems. In USENIX Conference Proceedings, pages 191-200, 1988.

WT99
Alma Whitten and J. D. Tygar. Why johnny can't encrypt: A usability evaluation of pgp 5.0. In Proceedings of the 8th USENIX Security Symposium, August 1999.


next up previous
Next: Random Art Up: Déjà Vu: A User Previous: Acknowledgments

Adrian Perrig
Thu Jun 15 15:16:10 PDT 2000