作者: Jim Littleton
DOI:
关键词:
摘要: x Chapter 1: Introduction 1 2: Graphical Passwords 3 2.1 Shoulder-surfing 4 2.2 Resistant Password Schemes 5 2.3 Intersection Analysis 8 3: Colordots 10 4: Experimental Design 16 4.1 Phase ColorDots Familiarization and Initial Tests 17 4.2 Recall 18 4.3 Attack Test 5: Data Collection 20 5.1 Subjects 5.2 Demographics 5.3 Procedure 21