Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords

by Julie Thorpe , P. C. Van Oorschot
Citations:40 - 8 self