Julie Thorpe
Julie Thorpe
Professor of Information Technology, University of Ontario Institute of Technology
Verified email at - Homepage
Cited by
Cited by
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords.
J Thorpe, PC van Oorschot
USENIX Security Symposium 8, 1-8, 2007
Pass-thoughts: authenticating with our minds
J Thorpe, PC Van Oorschot, A Somayaji
Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005
On semantic patterns of passwords and their security impact.
R Veras, C Collins, J Thorpe
NDSS, 2014
Towards secure design choices for implementing graphical passwords
J Thorpe, PC Van Oorschot
20th Annual Computer Security Applications Conference, 50-60, 2004
Graphical Dictionaries and the Memorable Space of Graphical Passwords.
J Thorpe, PC van Oorschot
USENIX Security Symposium, 135-150, 2004
Purely automated attacks on passpoints-style graphical passwords
PC Van Oorschot, A Salehi-Abari, J Thorpe
IEEE Transactions on Information Forensics and Security 5 (3), 393-405, 2010
On predictive models and user-drawn graphical passwords
PC Oorschot, J Thorpe
ACM Transactions on Information and system Security (TISSEC) 10 (4), 1-33, 2008
Exploiting predictability in click-based graphical passwords
PC van Oorschot, J Thorpe
Journal of Computer Security 19 (4), 669-702, 2011
Analyzing user choice in graphical passwords
D Nali, J Thorpe
School of Computer Science, Carleton University, Tech. Rep. TR-04-01, 2004
Visualizing semantics in passwords: The role of dates
R Veras, J Thorpe, C Collins
Proceedings of the ninth international symposium on visualization for cyber …, 2012
On purely automated attacks and click-based graphical passwords
A Salehi-Abari, J Thorpe, PC Van Oorschot
2008 Annual Computer Security Applications Conference (ACSAC), 111-120, 2008
Usability and security evaluation of GeoPass: a geographic location-password scheme
J Thorpe, B MacRae, A Salehi-Abari
Proceedings of the Ninth symposium on usable privacy and security, 1-14, 2013
The presentation effect on graphical passwords
J Thorpe, M Al-Badawi, B MacRae, A Salehi-Abari
proceedings of the SIGCHI conference on human factors in computing systems …, 2014
On password behaviours and attitudes in different populations
R Alomari, J Thorpe
Journal of information security and applications 45, 79-89, 2019
Systems, methods, and computer program products for providing video-passwords for user authentication
JK Thorpe, A Salehi-Abari, RE Burden
US Patent 8,966,614, 2015
A large-scale analysis of the semantic password model and linguistic patterns in passwords
R Veras, C Collins, J Thorpe
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-21, 2021
Do Password Managers Nudge Secure (Random) Passwords?
S Zibaei, DR Malapaya, B Mercier, A Salehi-Abari, J Thorpe
Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS), 2022
An exploration of geographic authentication schemes
B MacRae, A Salehi-Abari, J Thorpe
IEEE Transactions on Information Forensics and Security 11 (9), 1997-2012, 2016
Reinforcing system-assigned passphrases through implicit learning
Z Joudaki, J Thorpe, MV Martin
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
On the security of graphical password schemes
PC van Oorschot, J Thorpe
Technical Report TR-05-11. Integration and extension of USENIX Security 2004 …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20