Welcome to the SecHCI Project @ hooklee.com
(formerly supported by Microsoft Research Asia)
References @ the SecHCI Project    

Selected References on SecHCI/HumanAut

  1. Shujun Li and Heung-Yeung (Harry) Shum, Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey, eprint, 2002 (an early version has been published online in Elesevier Science's Comuter Science Preprint Archive, vol. 2003, no. 1, pp. 5-57, 2003)
  2. Shujun Li and Heung-Yeung (Harry) Shum, SecHCI: Secure Human-Computer Identification (Interface) Systems against Peeping Attacks, Cryptology ePrint Archive, Report 2005/268 (an early version has been appeared online in Elesevier Science's Comuter Science Preprint Archive, vol. 2004, no. 3, pp. 21-69, 2004)
  3. Ross J. Anderson, Why cryptosystems fail,Communications of the ACM, 37(11):32-40, 1994.
  4. Ross J. Anderson, Why cryptosystems fail, In Proc. 1st ACM Conf. Computer and Communication Security (CCS¡¯93), pages 215-227, 1993.
  5. Rachna Dhamija and Adrian Perrig, Deja Vu: A user study using images for authentication,. In Proc. the 9th USENIX Security Symposium, pages 45-58, 2000, available at http://www.usenix.org/events/sec2000/dhamija.html.
  6. searchSecurity.com, Shoulder surfing, available online at http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci802244,00.html, Feb. 14, 2002.
  7. BBC News, Chinese cameras spying on spouses, available at http://news.bbc.co.uk/hi/english/
    world/asia-pacific/newsid_1885000/1885218.stm
    , 21 March, 2002.
  8. Cassi Goodman, An introduction to TEMPEST, available online at http://rr.sans.org/encryption/TEMPEST.php, April 18, 2001.
  9. Joe Loughry and David A. Umphress, Information leakage from optical emanations, ACM Trans. Information and System Security, 5(3):262-289, 2002.
  10. Markus G. Kuhn, Optical time-domain eavesdropping risks of CRT displays, In Proc. 2002 IEEE Sym. Security and Privacy (S&P'02), pages 1-16. IEEE Computer Society, 2002.
  11. Manuel Blum and Nick Hopper, CS 827: Security and cryptography. Please visit http://www-2.cs.cmu.edu/%7Ehopper/cs827-f01, Fall September, 2001.
  12. Tsutomu Matsumoto, Human-computer cryptography: An attempt, In Proc. ACM Conf. on Computer and Communication Security (CCS'96), pages 68¨C75. ACM Press, 1996.
  13. Nicholas J. Hopper and Manuel Blum, A secure human-computer authentication scheme, Technical Report of Carnegie Mellon University, CMU-CS-00-139, available online at http://reports-archive.adm.cs.cmu.edu/anon/2000/abstracts/00-139.html, May, 2000.
  14. Nicholas J. Hopper and Manuel Blum, Secure human identification protocols, In Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science, vol. 2248, pages 52-66. Springer-Verlag, Berlin, 2001.
  15. Nick Hopper, Security and complexity aspects of human interactive proofs, presented at the First Workshop on Human Interactive Proofs (HIP), abstract available at http://www.aladdin.cs.cmu.edu/hips/events/abs/hopper_abstract.pdf, 2002.
  16. James A. Haskett, Pass-algorithms: A user validation scheme based on knowledge of secret algorithm, Communications of the ACM, 27(8):777-781, 1984.
  17. Sidney L. Smith, Authentication users by word association, Computers & Security, 6(6):464-470, 1987.
  18. Carl Ellison, Chris Hall, Randy Milbert, and Bruce Schneier, Protecting secret keys with personal entropy, Future Generation Computer Systems, 16(4):311-318, 2000.
  19. G. Miller, The magic number seven plus or minus two: Some limits on your capacity for processing information. Psychological Review, 63(1):81-96, 1956.
  20. David Bensinger, Human memory and the graphical password. Available at http://www.passlogix.com/media/pdfs/bensinger.pdf, 1998.
  21. Rachel Rue, Eighty-six bits of memory magic. Presented at the First Workshop on Human Interactive Proofs (HIP), abstract available at http://www.aladdin.cs.cmu.edu/hips/events/abs/rue_abstract.pdf, 2002.
  22. Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin, The design and analysis of graphical passwords, In Proc. 8th USENIX Security Symposium, pages 1-14, 1999, available at http://www.usenix.org/publications/library/proceedings/sec99/jermyn.html.
  23. ID Arts Inc., Passfaces - the art of identification, please visit http://www.idarts.com, 2002.
  24. Amos Fiat and Adi Shamir, How to prove yourself: Practical solutions to identification and signature problems, In Advances in Cryptology - CRYPTO¡¯86, Lecture Notes in Computer Science, vol. 263, pages 186-194. Springer-Verlag, Berlin, 1987.
  25. Aviel D. Rubin, Independent one-time passwords, Computing Systems, 9(1):15-27, 1996.
  26. Kazukumi Kobara and Hideki Imai, Limiting the visible space visual secret sharing schemes and their application to human identification, In Advances in Cryptology - ASIACRYPT¡¯96, Lecture Notes in Computer Science, vol. 1163, pages 185-195. Springer-Verlag, Berlin, 1996.
  27. Martina Angela Sasse, Sacha Brostoff, and Dirk Weirich, Transforming the "weakest link" ¨C a human/computer interaction approach to usable and effective security, BT Technology J., 19(3): 122-131, 2001.
  28. Maria M. King, Rebus passwords, In Proc. the 7th Annual Computer Security Applications Conference (ACSAC'91),
    pages 239-243. IEEE Press, 1991.

    Note: for more details about SecHCI and more references, please read [1,2] or contact Shujun LI.


This site is maintained by Shujun Li, last updated on 13 August, 2011.