Cryptography Reference
In-Depth Information
43. Paul C. van Oorschot and Julie Thorpe, “On Predictive Models and User-Drawn
Graphical Passwords,” ACM Transactions on Information and System Security 10, no. 4
(2008): 5.
44. Van Oorschot and Thorpe, “On Predictive Models and User-Drawn Graphical
Passwords,” 7.
45. For exploratory work that suggests altogether bypassing the perceptual system
using a brain-computer interface to measure the brain activity generated by
password recall, see Julie Thorpe, Paul C. van Oorschot, and Anil Somayaji,
“Pass-Thoughts: Authenticating with Our Minds,” in Proceedings of the 2005 Work-
shop on New Security Paradigms , ed. Simon Foley (New York: ACM Press, 2005),
45-56.
46. See Ross J. Anderson, Security Engineering , chapter 14, and especially Christian
Bessy and Francis Chateauraynaud, Experts et faussaires: Pour une sociologie de la
perception (Paris: Métailié, 1995).
47. Ross J. Anderson et al., The Global Internet Trust Register (Cambridge, Mass.: MIT
Press, 1999).
48. Adrian Perrig and Dawn Song, “Hash Visualization: A New Technique to Improve
Real-World Security,” in International Workshop on Cryptographic Techniques and
E-Commerce (CrypTEC '99) (July 1999), 439-458; Rachna Dhamija and Adrian Perrig,
“Déjà Vu: A User Study Using Images for Authentication,” in Proceedings of the 9th
USENIX Security Symposium (Berkeley: USENIX Association, 2000).
49. Michael Oehler, Dhananjay Phatak, and John Krautheim, “Visualizing Your Key
for Secure Phone Calls and Language Independence,” in VizSec '10, Proceedings of
the Seventh International Symposium on Visualization for Cyber Security , ed. John Gerth
(New York: ACM Press, 2010), 64-69; Patrick Juola, “Whole-Word Phonetic Distances
and the PGPfone Alphabet,” in Proceedings of the Fourth International Conference on
Spoken Language, ICSLP 96 (1996), 98-101.
50. PGP Corporation, PGP Desktop for Mac OS X User's Guide, version 8.1 (June 7,
2004), 129-134.
51. Moni Naor and Adi Shamir, “Visual Cryptography,” in Advances in Cryptology—
EUROCRYPT '94 , ed. Alfredo De Santis (Berlin: Springer, 1995), 1.
52. For a survey of the field, see Jonathan Weir and Wei Qi Yan, “A Comprehensive
Study of Visual Cryptography,” Transactions on Data Hiding and Multimedia Security
V , ed. Yun Q. Shi (Berlin: Springer, 2010): 70-105. For a generalization of the tech-
nique in the context of the selection of candidates on voting ballots, see Jeroen van
de Graaf, “Adapting Chaum's Voter-Verifiable Election Scheme to the Brazilian
System,” in Annals of IV Wseg—Workshop em Segurana de Sistemas Computacionais
(2004), 187-198.
Search WWH ::




Custom Search