Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. J Thorpe, PC van Oorschot USENIX Security Symposium 8, 1-8, 2007 | 291 | 2007 |
Pass-thoughts: authenticating with our minds J Thorpe, PC Van Oorschot, A Somayaji Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005 | 223 | 2005 |
Graphical Dictionaries and the Memorable Space of Graphical Passwords. J Thorpe, PC van Oorschot USENIX Security Symposium, 135-150, 2004 | 195 | 2004 |
Towards secure design choices for implementing graphical passwords J Thorpe, PC Van Oorschot 20th Annual Computer Security Applications Conference, 50-60, 2004 | 189* | 2004 |
On Semantic Patterns of Passwords and their Security Impact. R Veras, C Collins, J Thorpe NDSS, 2014 | 168 | 2014 |
On predictive models and user-drawn graphical passwords PC Oorschot, J Thorpe ACM Transactions on Information and system Security (TISSEC) 10 (4), 1-33, 2008 | 161 | 2008 |
Purely automated attacks on passpoints-style graphical passwords PC Van Oorschot, A Salehi-Abari, J Thorpe IEEE Transactions on Information Forensics and Security 5 (3), 393-405, 2010 | 159 | 2010 |
Exploiting predictability in click-based graphical passwords PC Van Oorschot, J Thorpe Journal of Computer Security 19 (4), 669-702, 2011 | 139 | 2011 |
Analyzing user choice in graphical passwords D Nali, J Thorpe School of Computer Science, Carleton University, Tech. Rep. TR-04-01, 2004 | 131 | 2004 |
On purely automated attacks and click-based graphical passwords A Salehi-Abari, J Thorpe, PC Van Oorschot 2008 Annual Computer Security Applications Conference (ACSAC), 111-120, 2008 | 89 | 2008 |
Visualizing semantics in passwords: The role of dates R Veras, J Thorpe, C Collins Proceedings of the Ninth International Symposium on Visualization for Cyber …, 2012 | 72 | 2012 |
Usability and security evaluation of geopass: A geographic location-password scheme J Thorpe, B MacRae, A Salehi-Abari Proceedings of the Ninth symposium on usable privacy and security, 1-14, 2013 | 60 | 2013 |
The presentation effect on graphical passwords J Thorpe, M Al-Badawi, B MacRae, A Salehi-Abari proceedings of the SIGCHI conference on human factors in computing systems …, 2014 | 26 | 2014 |
Systems, methods, and computer program products for providing video-passwords for user authentication JK Thorpe, A Salehi-Abari, RE Burden US Patent 8,966,614, 2015 | 23 | 2015 |
On the security of graphical password schemes PC van Oorschot, J Thorpe Technical Report TR-05-11. Integration and extension of USENIX Security 2004 …, 2005 | 15 | 2005 |
On password behaviours and attitudes in different populations R Alomari, J Thorpe Journal of information security and applications 45, 79-89, 2019 | 12 | 2019 |
An exploration of geographic authentication schemes B MacRae, A Salehi-Abari, J Thorpe IEEE Transactions on Information Forensics and Security 11 (9), 1997-2012, 2016 | 11 | 2016 |
Reinforcing system-assigned passphrases through implicit learning Z Joudaki, J Thorpe, MV Martin Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 9 | 2018 |
On the predictability and security of user choice in passwords J Thorpe Carleton University, 2008 | 9 | 2008 |
Video-passwords: Advertising while authenticating J Thorpe, A Salehi-Abari, R Burden Proceedings of the 2012 New Security Paradigms Workshop, 127-140, 2012 | 7 | 2012 |