<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1815-5928</journal-id>
<journal-title><![CDATA[Ingeniería Electrónica, Automática y Comunicaciones]]></journal-title>
<abbrev-journal-title><![CDATA[EAC]]></abbrev-journal-title>
<issn>1815-5928</issn>
<publisher>
<publisher-name><![CDATA[Universidad Tecnológica de La Habana José Antonio Echeverría, Cujae]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1815-59282019000300092</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Nuevo modelo probabilístico en autenticación gráfica]]></article-title>
<article-title xml:lang="en"><![CDATA[New probabilistic model on graphical authentication]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Legón]]></surname>
<given-names><![CDATA[Carlos Miguel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Socorro]]></surname>
<given-names><![CDATA[Raisa]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[Pedro]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[Osviel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Borrego]]></surname>
<given-names><![CDATA[Ernesto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto de Criptografía  ]]></institution>
<addr-line><![CDATA[ La Habana]]></addr-line>
<country>Cuba</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Tecnológica de La Habana  ]]></institution>
<addr-line><![CDATA[ La Habana]]></addr-line>
<country>Cuba</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad de Ciencias Informáticas  ]]></institution>
<addr-line><![CDATA[ La Habana]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<volume>40</volume>
<numero>3</numero>
<fpage>92</fpage>
<lpage>104</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S1815-59282019000300092&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S1815-59282019000300092&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S1815-59282019000300092&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN La autenticación es esencial en la seguridad de los modernos servicios digitales de procesamiento de información. Las contraseñas alfanuméricas son las más empleadas, pero poseen debilidades que las hacen vulnerables a diversos ataques basados en modelos probabilísticos. Una de las alternativas es la autenticación gráfica. Los modelos probabilísticos en autenticación gráfica se aplican para estimar la clave más probable a seleccionar, en cada imagen, por el usuario que se va a registrar. En este trabajo se propone un nuevo modelo probabilístico de autenticación gráfica, su principal aporte consiste en que permite cuantificar el grado de autenticidad de cada usuario. Se confirma experimentalmente que el modelo propuesto es efectivo y permite medir en la práctica el nivel de autenticidad de los usuarios autenticados.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT Authentication is essential in the security of modern digital information processing services. Alphanumeric passwords are the most used, but they have weaknesses that make them vulnerable to various attacks based on probabilistic models. One of the alternatives is graphical authentication. The probabilistic models in graphical authentication are applied to estimate the most likely key to be selected in each image by the user to be registered. In this work a new probabilistic model of graphic authentication is proposed, its main contribution is that it allows quantifying the degree of authenticity of each user. It is confirmed experimentally that the proposed model is effective and allows to measure in practice the authenticity level of authenticated users.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[autenticación gráfica]]></kwd>
<kwd lng="es"><![CDATA[modelo probabilístico]]></kwd>
<kwd lng="es"><![CDATA[contraseñas]]></kwd>
<kwd lng="en"><![CDATA[graphical authentication]]></kwd>
<kwd lng="en"><![CDATA[probabilistic model]]></kwd>
<kwd lng="en"><![CDATA[password]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burr]]></surname>
<given-names><![CDATA[W. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Dodson]]></surname>
<given-names><![CDATA[D. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Newton]]></surname>
<given-names><![CDATA[E. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Perlner]]></surname>
<given-names><![CDATA[R. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Polk]]></surname>
<given-names><![CDATA[W. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Nabbus]]></surname>
<given-names><![CDATA[E. A]]></given-names>
</name>
</person-group>
<source><![CDATA[Electronic authentication guideline: Recommendations of the national Institute of Standards and Technology]]></source>
<year>2012</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[U.S. Department of Commerce and National Institute of Standards and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Legón]]></surname>
<given-names><![CDATA[C.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[P.E.]]></given-names>
</name>
<name>
<surname><![CDATA[E.A]]></surname>
<given-names><![CDATA[. Borrego]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Socorro]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Modelos probabilísticos de contraseñas alfanuméricas]]></source>
<year>2018</year>
<conf-name><![CDATA[ IVSeminario Científico Nacional de Criptografía]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walkup]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[The password problem]]></source>
<year>2016</year>
<publisher-name><![CDATA[Sandia National Laboratories]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Legón]]></surname>
<given-names><![CDATA[C.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Socorro]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica]]></article-title>
<source><![CDATA[Revista Cubana de Ciencias Informáticas]]></source>
<year>2018</year>
<volume>12</volume>
<numero>^sEspecial UCIENCIA</numero>
<issue>^sEspecial UCIENCIA</issue>
<supplement>Especial UCIENCIA</supplement>
<page-range>13-27</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[A study of probabilistic password models]]></source>
<year>2014</year>
<volume>1</volume>
<conf-name><![CDATA[ IEEE Symposium on Security and Privacy]]></conf-name>
<conf-loc> </conf-loc>
<page-range>689-704</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castelluccia]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[DÃ&#338;rmuth]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Perito]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Adaptive password-strength meters from markov models]]></source>
<year>2012</year>
<conf-name><![CDATA[ 19thAnnual Network &amp; Distributed System Security Symposium]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[San Diego, United States ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Golla]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[DÃ&#338;rmuth]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[On the accuracy of password strength meters]]></source>
<year>2018</year>
<conf-name><![CDATA[ Conference on Computer and Communications Security]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Toronto, Canada ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weir]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Aggarwal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[de Medeiros]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Glodek]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Password cracking using probabilistic contex-free grammars]]></source>
<year>2009</year>
<conf-name><![CDATA[ IEEE Symposium on Security and Privacy]]></conf-name>
<conf-loc> </conf-loc>
<page-range>391-405</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[HouGlodek]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Aggarwal]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Building better passwords using probabilistic techniques]]></source>
<year>2012</year>
<conf-name><![CDATA[ 28thAnnual Computer Security Applications Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>109-18</page-range><publisher-loc><![CDATA[New York, USA ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blocki]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Benjamin]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Samson]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
</person-group>
<source><![CDATA[On the economics of offline password cracking]]></source>
<year>2018</year>
<volume>1</volume>
<conf-name><![CDATA[ IEEE Symposium on Security and Privacy]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Malone]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Maher]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Investigating the distribution of password choices]]></source>
<year>2012</year>
<conf-name><![CDATA[ 21stInternational Conference on World Wide Web]]></conf-name>
<conf-loc> </conf-loc>
<page-range>301-10</page-range><publisher-loc><![CDATA[New York, NY, USA ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Haibom]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Jian]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Zipfs law in passwords]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2017</year>
<volume>12</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>2776-91</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[On the implications of zipfs law in passwords]]></source>
<year>2016</year>
<conf-name><![CDATA[ European Symposium on Research in Computer Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>11-131</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Malone]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Maher]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Investigating the distribution of password choices]]></source>
<year>2012</year>
<conf-name><![CDATA[ 21stInternational Conference on World Wide Web]]></conf-name>
<conf-loc> </conf-loc>
<page-range>301-10</page-range><publisher-loc><![CDATA[Lyon, France ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Melicher]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ur]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Segreti]]></surname>
<given-names><![CDATA[S.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Komanduri]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bauer]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Christin]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Cranor]]></surname>
<given-names><![CDATA[L.F]]></given-names>
</name>
</person-group>
<source><![CDATA[Fast, lean, and accurate: Modeling password guessability using neural networks]]></source>
<year>2016</year>
<conf-name><![CDATA[ 25thUSENIX Security Symposium]]></conf-name>
<conf-loc> </conf-loc>
<page-range>10-2</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Todd]]></surname>
<given-names><![CDATA[M.N]]></given-names>
</name>
</person-group>
<source><![CDATA[An investigation of machine learning for password evaluation]]></source>
<year>2016</year>
<publisher-name><![CDATA[Arizona State University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chou]]></surname>
<given-names><![CDATA[H.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[H.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[H. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lai]]></surname>
<given-names><![CDATA[F.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[K. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hsueh]]></surname>
<given-names><![CDATA[C. W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Password cracking based on learned patterns from disclosed passwords]]></article-title>
<source><![CDATA[International Journal of Innovative Computing, Information and Control]]></source>
<year>2013</year>
<volume>9</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>821-39</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dirik]]></surname>
<given-names><![CDATA[A.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Cranor]]></surname>
<given-names><![CDATA[L.F.]]></given-names>
</name>
<name>
<surname><![CDATA[Birget]]></surname>
<given-names><![CDATA[J.C]]></given-names>
</name>
</person-group>
<source><![CDATA[Modeling user choice in the passpoints graphical password scheme]]></source>
<year>2007</year>
<conf-name><![CDATA[ 3rdSymposium on Usable Privacy and Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>20-8</page-range><publisher-loc><![CDATA[New York, NY, USA ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Wei]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Security implications of password discretization for click-based graphical passwords]]></source>
<year>2013</year>
<conf-name><![CDATA[ 22ndInternational Conference on World Wide Web]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1581-91</page-range><publisher-loc><![CDATA[New York, USA ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Devlin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Nurse]]></surname>
<given-names><![CDATA[J.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hodges]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldsmith]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Creese]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Predicting graphical passwords]]></source>
<year>2015</year>
<volume>9190</volume>
<conf-name><![CDATA[ Proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust]]></conf-name>
<conf-loc> </conf-loc>
<page-range>23-35</page-range><publisher-loc><![CDATA[New York, NY, USA ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag New York, Inc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biddle]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiasson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Van Oorschot]]></surname>
<given-names><![CDATA[P.C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Graphical passwords: Learning from the first twelve years]]></article-title>
<source><![CDATA[ACM Computer Survey]]></source>
<year>2012</year>
<volume>44</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>19:41</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shendage]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dhainje]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramesh]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cued click points: Graphical password authentication technique for security]]></article-title>
<source><![CDATA[International Journal of Computer Science and Information Technologies]]></source>
<year>2014</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1073-5</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Carnavalet]]></surname>
<given-names><![CDATA[X.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mannan]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[From very weak to very strong: Analyzing password-strength meters]]></source>
<year>2014</year>
<conf-name><![CDATA[ 21stAnnual Network and Distributed System Security Symposium]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[San Diego, CA, USA ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[L.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Legón]]></surname>
<given-names><![CDATA[C.M]]></given-names>
</name>
</person-group>
<source><![CDATA[Estimación de la fortaleza de las contraseñas]]></source>
<year>2014</year>
<publisher-loc><![CDATA[La Habana, Cuba ]]></publisher-loc>
<publisher-name><![CDATA[Facultad de Ingeniería Informática. Universidad Tecnológica de la Habana]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Toledo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Legón]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[J. L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Caracterización de un atacante a sistemas de autenticación por contraseña]]></article-title>
<source><![CDATA[Segurmática]]></source>
<year>2014</year>
<publisher-loc><![CDATA[La Habana, Cuba ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chrysanthou]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[Modern password cracking: A hands-on approach to creating an optimised and versatile attack]]></source>
<year>2013</year>
<publisher-name><![CDATA[University of London]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shouling]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Shukun]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ting]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Changchang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[WeiHan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Raheem]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Pars: A uniform and open-source password analysis and research system]]></source>
<year>2015</year>
<conf-name><![CDATA[ 31stAnnual Computer Security Applications Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>321-30</page-range><publisher-loc><![CDATA[New York, USA ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shaikh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pathan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Patel]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[S]]></surname>
<given-names><![CDATA[S. Rukaiya]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Implementation of authentication using graphical password cloud computing]]></article-title>
<source><![CDATA[International Research Journal of Engineering and Technology]]></source>
<year>2018</year>
<volume>5</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>3293-7</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jue Min]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yong Hao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Huey Wen]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Soon Guan]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Li Ho]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Azman]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Siong Hoe]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparison of graphical password using iso 9126]]></article-title>
<source><![CDATA[Advanced Science Letters]]></source>
<year>2016</year>
<volume>4</volume>
<page-range>400-7</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Birget]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Memon]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Graphical pass-words based on robust discretization]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2006</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Birget]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Memon]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Graphical passwords based on robust discretization]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2006</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>395-9</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chiasson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Srinivasan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Biddle]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[van Oorschot]]></surname>
<given-names><![CDATA[P.C]]></given-names>
</name>
</person-group>
<source><![CDATA[Centered discretization with application to graphical passwords]]></source>
<year>2008</year>
<conf-name><![CDATA[ 1stConference on Usability, Psycology, and Security]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[San Francisco, CA, USA ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bicakci]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Optimal Discretization for High-Entropy Graphical Passwords]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Ankara, Turkey ]]></publisher-loc>
<publisher-name><![CDATA[OBB University of Economics and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrego]]></surname>
<given-names><![CDATA[E.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[P.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Legón]]></surname>
<given-names><![CDATA[C.M]]></given-names>
</name>
</person-group>
<collab>Instituto de Criptografía. Sociedad Cubana de Matemática y Computación</collab>
<source><![CDATA[Debilidades de los métodos de discretización para contraseñas gráficas]]></source>
<year>2018</year>
<conf-name><![CDATA[ IVSeminario Científico Nacional de Criptografía]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wiedenbeck]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Waters]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Birget]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Brodskiy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Memon]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Passpoints: design and longitudinal evaluation of a graphical password system]]></article-title>
<source><![CDATA[International Journal of Human Computers Studies]]></source>
<year>2005</year>
<volume>63</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>102-27</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karmajit]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhushan]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Prasad-Mishra]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Priyadarsini-Satapathy]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Cued-click point graphical password using circular tolerance to increase password space and persuasive features]]></source>
<year>2016</year>
<volume>79</volume>
<conf-name><![CDATA[ International Conference on Communication, Computing and Virtualization]]></conf-name>
<conf-loc> </conf-loc>
<page-range>561-8</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bin]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[D.W.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Security implications of password discretization for click-based graphical passwords]]></source>
<year>2013</year>
<conf-name><![CDATA[ 22ndInternational Conference on World Wide Web]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Rio de Janeiro, Brazil ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salehi-Abari]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Thorpe]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[van Oorschot]]></surname>
<given-names><![CDATA[P.C]]></given-names>
</name>
</person-group>
<source><![CDATA[On purely automated attacks and click-based graphical password]]></source>
<year>2008</year>
<conf-name><![CDATA[ Annual Computer Security Applications Conference]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Anaheim, CA, USA ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Freeman]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dürmuth]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Biggio]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Giacinto]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Who are you? A statistical approach to measuring user authenticity]]></source>
<year>2016</year>
<conf-name><![CDATA[ NDSS&#8217;16. The Internet Society]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[San Diego, CA, USA ]]></publisher-loc>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
