메뉴 건너뛰기




Volumn 229, Issue , 2007, Pages 169-170

TwoKind authentication: Usable authenticators for untrustworthy environments

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ELECTRONIC MAIL; INTERNET; USER INTERFACES; WEBSITES;

EID: 36849026688     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1280680.1280712     Document Type: Conference Paper
Times cited : (1)

References (5)
  • 1
    • 36849026114 scopus 로고    scopus 로고
    • eTrade Trading Passwords. https://www.etradeaustralia.com.au/EStation/ hep_aec_connecting.asp.
    • eTrade Trading Passwords. https://www.etradeaustralia.com.au/EStation/ hep_aec_connecting.asp.
  • 2
    • 84886287589 scopus 로고    scopus 로고
    • Facebook. http://www.facebook.com.
    • Facebook
  • 4
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • November
    • Leslie Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, November 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 5
    • 19944423977 scopus 로고
    • The protection of information in computer systems
    • July
    • Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Communications of the ACM, 17(7), July 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.