Talk:Graphical password

Latest comment: 4 years ago by Rhododendrites in topic additional sources

additional sources

edit

I had these in a comment in the article while a draft. Moving here for later (hopefully not much later). — Rhododendrites talk \\ 18:23, 1 February 2020 (UTC)Reply

Using AJAX for Image Passwords – AJAX Security Part 1 of 3. waelchatila.com (2005-09-18). Retrieved on 2012-05-20.

Zhao, Ziming; Ahn, Gail-Joon; Seo, Jeong-Jin; Hu, Hongxin (14 August 2013). "On the Security of Picture Gesture Authentication" (PDF). Proceedings of the 22nd USENIX Security Symposium. Washington, D.C.: USENIX. ISBN 9781931971034.

Thorpe, Julie; van Oorschot, P.C. (2011). "Exploiting Predictability in Click-Based Graphical Passwords" (PDF). Journal of Computer Security. 19 (4): 669–702. doi:10.3233/JCS-2010-0411.

Chakrabarti, Saikat; Landon, George V.; Singhal, Mukesh (2 April 2007). "Graphical Passwords: Drawing a Secret with Rotation as a New Degree of Freedom" (PDF). Fourth IASTED Asian Conference on Communication Systems and Networks. Phuket, Thailand: ACTA Press.

Lashkari, Arash Habibi; Saleh, Rosli; Farmand, Samaneh; Bin Zakaria, Omar (December 2009). "A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns". pp. 17–25. arXiv:1001.1962. {{cite arXiv}}: Unknown parameter |number= ignored (help); Unknown parameter |volume= ignored (help)

Kale, Navanth D.; Nalgirkar, Megha M. (April 2013). "An Ample-Range Survey on Recall-Based Graphical Password Authentication Based On Multi-Line Grid and Attack Patterns" (PDF). International Journal of Science and Modern Engineering.