메뉴 건너뛰기




Volumn 4292 LNCS - II, Issue , 2006, Pages 741-749

Analysis and design of graphical password techniques

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL GEOMETRY; COMPUTATIONAL METHODS; GRAPHIC METHODS; TEXT PROCESSING;

EID: 33845449071     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11919629_74     Document Type: Conference Paper
Times cited : (12)

References (12)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • Adams, A., Sasse, M. A.: Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures, Communications of the ACM, Vol.42. (1999):41-6
    • (1999) Communications of the ACM , vol.42 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 5
    • 84941189711 scopus 로고    scopus 로고
    • last retrieved in August 2006
    • RealUser,: www.realuser.com, (last retrieved in August 2006)
  • 7
    • 19944381937 scopus 로고    scopus 로고
    • PassPoints: Design and longitudinal evaluation of a graphical password system
    • International Journal of Human Computer Studies
    • Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A., Memon, N.: PassPoints: design and longitudinal evaluation of a graphical password system, International Journal of Human Computer Studies. International Journal of Human-Computer Studies, 63 (2005) 102-127
    • (2005) International Journal of Human-computer Studies , vol.63 , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.C.3    Brodskiy, A.4    Memon, N.5
  • 8
    • 33751051139 scopus 로고    scopus 로고
    • Authenticating mobile device users through image selection
    • K. Morgan & M. J. Spector (Editors), WIT Press
    • Wayne J.: Authenticating mobile device users through image selection, in Advances in Learning, Commerce and Security, K. Morgan & M. J. Spector (Editors), WIT Press (2004)
    • (2004) Advances in Learning, Commerce and Security
    • Wayne, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.