0 0

Proje Grubu: EEEAG Sayfa Sayısı: 163 Proje No: 107E227 Proje Bitiş Tarihi: 01.02.2010 Metin Dili: Türkçe İndeks Tarihi: 29-07-2022

Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi

Öz:
-
Anahtar Kelime:

Konular: Bilgisayar Bilimleri, Yazılım Mühendisliği Savunma Bilimleri
Erişim Türü: Erişime Açık
  • ATALAY N.B., Misirlisoy M., “Does attention capacity correlate with the effects of chord function on phoneme monitoring?”, IEEE ISCIS 2009, 14-16 September 2009, North Cryprus.
  • BALFANZ, D. ; Durfee, G. E. ; Grinter, R. E. ; Smetters, D. K. ; Stewart, P., “Network-in-a-Box: How to Set up a Secure Wireless Network in under a Minute,” Proc. 13th Usenix Security Symp., Usenix Assoc., 2004, pp. 207–221.
  • BIÇAKCI K., “Optimal Discretization for High-Entropy Graphical Passwords”, 23rd International Symposium on Computer and Information Sciences, IEEE ISCIS 2008, October 27-29, 2008, İstanbul (2008).
  • BIÇAKCIa K., Yücel M., Erdeniz B., Gürbaşlar H., Atalay N.B., “Graphical Passwords as Browser Extension: Implementation and Usability Study”, Third IFIP WG 11.11 International Conference on Trust Management, June 15-19, 2009, Purdue University, West Lafayette, USA.
  • BIÇAKCIb K., Yüceel M., Erdeniz B., Gürbaşlar H., Atalay N.B., “Graphical Passwords as Browser Extension: Implementation and Usability Study”, SOUPS 2009 – Symposium on Usable Privacy and Security, July 15-17, 2009, Mountain View, CA; USA, Poster (Showcasing Usable Privacy and Security Papers Published in the Past Year at Other Conferences).
  • BIÇAKCIc K., Atalay N.B., Yüceel M., Gürbaşlar H., Erdeniz B., “Towards Usable Solutions to Graphical Password Hotspot Problem”, 4th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2009), July 20-24 2009, Seattle, Washington, USA.
  • BIÇAKCIa K., Atalay N.B., Yüceel M., Gürbaşlar H., “Usability of Password Managers: A Long Term Field Study on Graphical Password as Browser Extension (GPEX)”, (gönderildi).
  • BIÇAKCIa K., Atalay N.B.,“Johnny in Internet Café: A User Study on Password Autocomplete Feature of Web Browsers”, (gönderildi).
  • BIÇAKCIb K., Atalay N.B., Yüceel M., “PassIcons - A Convenient Method for Remembering Strong Passwords”, (gönderildi).
  • BIÇAKCIc K., “Kullanışlı Güvenlik için Temel Prensipler”, 4. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, ISCTURKEY 2010, 6-8 Mayıs 2010, Ankara, TURKEY.
  • BICAKCIe, K., “Parola problemlerine Son”, http://akademikguvenlik.wordpress.com/2010/03/26/parola-problemlerine-son/
  • BIDDLE R., S. Chiasson, and P.C. van Oorschot. Graphical passwords: Learning from the first generation. Technical Report TR-09-09, School of Computer Science, Carleton University, 2009.
  • BIRGET J.C., Dawei Hong, Nasir Memon, ``Robust discretization, with an application to graphical passwords'', IEEE Transactions on Information Forensics and Security, 1(3) (Sept. 2006) 395-399.
  • BLONDER G. E., Graphical password. US Patent 5559961, Lucent Technologies, Inc., Murray Hill, NJ, August 30, 1995.
  • CHIASSONa S., Robert Biddle, P.C. van Oorschot. A Second Look at the Usability of Click-Based Graphical Passwords. (SOUPS 2007 Best Paper Award.) Symposium on Usable Privacy and Security, July 18-20 2007, Pittsburgh, PA.
  • CHIASSONb S., P.C. van Oorschot, R. Biddle. Graphical Password Authentication Using Cued Click Points. ESORICS, Sept.24-27 2007, Dresden, Germany. Springer-Verlag LNCS 4734 (2007), pp.359-374.
  • CHIASSONa S., A. Forget, R. Biddle, P.C. van Oorschot. Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. HCI 2008, September 1-5 2008, Liverpool, U.K.
  • CHIASSONb, “Usable authentication and click-based graphical passwords,” Ph.D. dissertation, School of Computer Science, Carleton University, December 2008.
  • CHIASSON S., A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle, 2009. Multiple password interference in text and click-based graphical passwords. In Proccedings og ACM Computer and Communications Security (CCS), November 2009.
  • DE ANGELI A., Lynne M. Coventry, Graham Johnson, Karen Renaud: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Man-Machine Studies 63(1-2): 128-152 (2005)
  • DHAMIJA, R., Perrig, A., 2000. De´ja` vu: a User Study Using Images for Authentication. Proceedings of USENIX Security Symposium, August 2000.
  • DIRIK A. E., N. Memon, J.C. Birget, ``Modeling user choice in the PassPoints graphical password scheme”, Symposium on Usable Privacy and Security (SOUPS), July 2007, at Carnegie-Mellon Univ., Pittsburgh.
  • GARFINKEL S.L. and A. Shelat, “Remembrance of Data Passed: A Study of Disk Sanitization Practices,” IEEE Security & Privacy, vol. 1, no. 1, 2003, pp. 17–27.
  • GUTMANN P., Security usability, February 2008, Draft. http://www.cs.auckland.ac.nz/~pgut001/pubs/usability.pdf
  • HEILMAN C., “Web Security: Are you part of the problem”, http://www.smashingmagazine.com/2010/01/14/web-security-primer-are-you-part-of-theproblem/. Last accessed on 03/04/2010.
  • JERMYN I., Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in 8th USENIX Security Symposium, August 1999.
  • JOSANG A., Alfayyadh, B., Grandison, T., Alzomai, M. & McNamara, J. (2007b), Security Usability Principles for Vulnerability Analysis and Risk Assessment, in 'The Proceedings of the Annual Computer Security Applications Conference (ACSAC '07)'.
  • KRAMER, W. Kirlik (Eds.), 2007, Attention: From Theory to Practice (Series in Human-Technology Interaction).
  • MONCUR W., G. Leplâtre: Pictures at the ATM: exploring the usability of multiple graphical passwords”, Proceedings of the SIGCHI conference on Human factors in computing systems, Pages: 887 – 894, 2007.
  • PASSFACES, Passfaces Corporation, “The science behind Passfaces,” http://www.passfaces.com/enterprise/resources/white_papers.htm, White paper, Last accessed on 19/02/2010.
  • RENAUD K., Antonella De Angeli: My password is here! An investigation into visuospatial authentication mechanisms. Interacting with Computers 16(6): 1017-1041 (2004).
  • ROSS B., Jackson C., Miyake N., Boneh D., and Mitchell J. 2005. Stronger password authentication using browser extensions. In Proceedings of 14th USENIX Security Symposium, Baltimore, August 2005.
  • SCHECHTER, S., Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them, http://cups.cs.cmu.edu/soups/2010/howtosoups.pdf
  • TARI F., Ozok, A. Ant and Holden, Stephen H. (2006): A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 56-66.
  • THORPE J., P.C. van Oorschot. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. 16th USENIX Security Symposium, Aug.6-10 2007, Boston, MA.
  • WEINSHALL D. and S. Kirkpatrick: Passwords You’ll Never Forget, but Can’t Recall. In Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004, pp. 1399-1402.
  • WIEDENBECKa, S. et al. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63, pp. 102-127, 2005.
  • WIEDENBECKb S., J. Waters, J.C. Birget, A. Brodskiy, N. Memon, ``Authentication using graphical passwords: Effects of tolerance and image choice'', Symposium on Usable Privacy and Security (SOUPS), 6-8 July 2005, at Carnegie-Mellon Univ., Pittsburgh.
  • WIEDENBECKc S., J. Waters, L. Sobrado, J.C. Birget, ``Design and evaluation of a shoulder-surfing resistant graphical password scheme'', in Proceedings of Advanced Visual Interfaces (AVI2006), Venice, Italy, 23-26 May 2006.
  • WOLFE J., Visual attention. In: De Valois KK, editor. Seeing. 2nd ed. San Diego, CA: Academic Press; 2000. p. 335-386.
APA BIÇAKCI K, ATALAY N, KARA O (2010). Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. , 1 - 163.
Chicago BIÇAKCI Kemal,ATALAY Nart Bedin,KARA Orhun Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. (2010): 1 - 163.
MLA BIÇAKCI Kemal,ATALAY Nart Bedin,KARA Orhun Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. , 2010, ss.1 - 163.
AMA BIÇAKCI K,ATALAY N,KARA O Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. . 2010; 1 - 163.
Vancouver BIÇAKCI K,ATALAY N,KARA O Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. . 2010; 1 - 163.
IEEE BIÇAKCI K,ATALAY N,KARA O "Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi." , ss.1 - 163, 2010.
ISNAD BIÇAKCI, Kemal vd. "Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi". (2010), 1-163.
APA BIÇAKCI K, ATALAY N, KARA O (2010). Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. , 1 - 163.
Chicago BIÇAKCI Kemal,ATALAY Nart Bedin,KARA Orhun Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. (2010): 1 - 163.
MLA BIÇAKCI Kemal,ATALAY Nart Bedin,KARA Orhun Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. , 2010, ss.1 - 163.
AMA BIÇAKCI K,ATALAY N,KARA O Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. . 2010; 1 - 163.
Vancouver BIÇAKCI K,ATALAY N,KARA O Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi. . 2010; 1 - 163.
IEEE BIÇAKCI K,ATALAY N,KARA O "Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi." , ss.1 - 163, 2010.
ISNAD BIÇAKCI, Kemal vd. "Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi". (2010), 1-163.