메뉴 건너뛰기




Volumn 2, Issue 1, 2003, Pages 30-36

Photographic authentication through untrusted terminals

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL PHOTOGRAPHY; IMAGE RECOGNITION; PHOTOGRAPHIC AUTHENTICATION; STATISTICAL SAMPLING;

EID: 3042844145     PISSN: 15361268     EISSN: None     Source Type: Journal    
DOI: 10.1109/MPRV.2003.1186723     Document Type: Article
Times cited : (59)

References (5)
  • 1
    • 3042800774 scopus 로고    scopus 로고
    • Key snooping technology causes controversy
    • Mar.
    • I.L. Paulson, "Key Snooping Technology Causes Controversy," Computer, Mar. 2002, p. 27.
    • (2002) Computer , pp. 27
    • Paulson, I.L.1
  • 2
    • 0027758414 scopus 로고
    • Why cryptosystems fail
    • Nov.
    • R. Anderson, "Why Cryptosystems Fail," Comm. ACM, Nov. 1994, pp. 215-227.
    • (1994) Comm. ACM , pp. 215-227
    • Anderson, R.1
  • 3
    • 0014781338 scopus 로고
    • How we remember what we see
    • May
    • R. Harbor, "How We Remember What We See," Scientific American, vol. 222, no. 5, May 1970, pp. 104-112.
    • (1970) Scientific American , vol.222 , Issue.5 , pp. 104-112
    • Harbor, R.1
  • 4
    • 84937431479 scopus 로고    scopus 로고
    • Personal servers: Changing the way we think about ubiquitous computing
    • Springer-Verlag
    • R. Want et al., "Personal Servers: Changing the Way We Think about Ubiquitous Computing," Proc. Ubicomp 2002, Springer-Verlag, 2002, pp. 194-209.
    • (2002) Proc. Ubicomp 2002 , pp. 194-209
    • Want, R.1
  • 5
    • 85084162119 scopus 로고    scopus 로고
    • Hand-held computers can be better smart cards
    • Usenix
    • D. Balfanz and E. Felten, "Hand-Held Computers Can Be Better Smart Cards," Proc. Usenix Security 99, Usenix, 1999, pp. 15-24.
    • (1999) Proc. Usenix Security 99 , pp. 15-24
    • Balfanz, D.1    Felten, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.