Talk:Graphical password
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||
|
additional sources
editI had these in a comment in the article while a draft. Moving here for later (hopefully not much later). — Rhododendrites talk \\ 18:23, 1 February 2020 (UTC)
Using AJAX for Image Passwords – AJAX Security Part 1 of 3. waelchatila.com (2005-09-18). Retrieved on 2012-05-20.
Zhao, Ziming; Ahn, Gail-Joon; Seo, Jeong-Jin; Hu, Hongxin (14 August 2013). "On the Security of Picture Gesture Authentication" (PDF). Proceedings of the 22nd USENIX Security Symposium. Washington, D.C.: USENIX. ISBN 9781931971034.
Thorpe, Julie; van Oorschot, P.C. (2011). "Exploiting Predictability in Click-Based Graphical Passwords" (PDF). Journal of Computer Security. 19 (4): 669–702. doi:10.3233/JCS-2010-0411.
Chakrabarti, Saikat; Landon, George V.; Singhal, Mukesh (2 April 2007). "Graphical Passwords: Drawing a Secret with Rotation as a New Degree of Freedom" (PDF). Fourth IASTED Asian Conference on Communication Systems and Networks. Phuket, Thailand: ACTA Press.
Lashkari, Arash Habibi; Saleh, Rosli; Farmand, Samaneh; Bin Zakaria, Omar (December 2009). "A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns". pp. 17–25. arXiv:1001.1962. {{cite arXiv}}
: Unknown parameter |number=
ignored (help); Unknown parameter |volume=
ignored (help)
Kale, Navanth D.; Nalgirkar, Megha M. (April 2013). "An Ample-Range Survey on Recall-Based Graphical Password Authentication Based On Multi-Line Grid and Attack Patterns" (PDF). International Journal of Science and Modern Engineering.