Julie Thorpe
Julie Thorpe
Associate Professor of Information Technology, University of Ontario Institute of Technology
Verified email at - Homepage
Cited by
Cited by
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords.
J Thorpe, PC van Oorschot
USENIX Security Symposium 8, 1-8, 2007
Pass-thoughts: authenticating with our minds
J Thorpe, PC Van Oorschot, A Somayaji
Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005
On semantic patterns of passwords and their security impact.
R Veras, C Collins, J Thorpe
NDSS, 2014
Towards secure design choices for implementing graphical passwords
J Thorpe, PC Van Oorschot
20th Annual Computer Security Applications Conference, 50-60, 2004
Graphical Dictionaries and the Memorable Space of Graphical Passwords.
J Thorpe, PC van Oorschot
USENIX Security Symposium, 135-150, 2004
Purely automated attacks on passpoints-style graphical passwords
PC Van Oorschot, A Salehi-Abari, J Thorpe
IEEE Transactions on Information Forensics and Security 5 (3), 393-405, 2010
On predictive models and user-drawn graphical passwords
PC Oorschot, J Thorpe
ACM Transactions on Information and system Security (TISSEC) 10 (4), 1-33, 2008
Exploiting predictability in click-based graphical passwords
PC Van Oorschot, J Thorpe
Journal of Computer Security 19 (4), 669-702, 2011
Analyzing user choice in graphical passwords
D Nali, J Thorpe
School of Computer Science, Carleton University, Tech. Rep. TR-04-01, 2004
On purely automated attacks and click-based graphical passwords
A Salehi-Abari, J Thorpe, PC Van Oorschot
2008 Annual Computer Security Applications Conference (ACSAC), 111-120, 2008
Visualizing semantics in passwords: The role of dates
R Veras, J Thorpe, C Collins
Proceedings of the ninth international symposium on visualization for cyber …, 2012
Usability and security evaluation of GeoPass: a geographic location-password scheme
J Thorpe, B MacRae, A Salehi-Abari
Proceedings of the Ninth symposium on usable privacy and security, 1-14, 2013
The presentation effect on graphical passwords
J Thorpe, M Al-Badawi, B MacRae, A Salehi-Abari
proceedings of the SIGCHI conference on human factors in computing systems …, 2014
Systems, methods, and computer program products for providing video-passwords for user authentication
JK Thorpe, A Salehi-Abari, RE Burden
US Patent 8,966,614, 2015
On password behaviours and attitudes in different populations
R Alomari, J Thorpe
Journal of information security and applications 45, 79-89, 2019
An exploration of geographic authentication schemes
B MacRae, A Salehi-Abari, J Thorpe
IEEE Transactions on Information Forensics and Security 11 (9), 1997-2012, 2016
On the security of graphical password schemes
PC van Oorschot, J Thorpe
Technical Report TR-05-11. Integration and extension of USENIX Security 2004 …, 2005
Reinforcing system-assigned passphrases through implicit learning
Z Joudaki, J Thorpe, MV Martin
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
On the predictability and security of user choice in passwords
J Thorpe
Carleton University, 2008
Geographical security questions for fallback authentication
A Addas, A Salehi-Abari, J Thorpe
2019 17th international conference on privacy, security and trust (PST), 1-6, 2019
The system can't perform the operation now. Try again later.
Articles 1–20