메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Awase-E: Recognition-based image authentication scheme using users' personal photographs

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; EXPERIMENTS; IMAGING TECHNIQUES; INFORMATION TECHNOLOGY; INNOVATION; PHOTOGRAPHY; TECHNOLOGY;

EID: 50049099712     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INNOVATIONS.2006.301970     Document Type: Conference Paper
Times cited : (19)

References (6)
  • 1
    • 85084161493 scopus 로고    scopus 로고
    • R. Dhamija and A.Perrig, Deja Vu: A User Study Using Images for Authentication, In proc. of 9th USENIX Security Symposium, pp.45-58, August 2000.
    • R. Dhamija and A.Perrig, "Deja Vu: A User Study Using Images for Authentication", In proc. of 9th USENIX Security Symposium, pp.45-58, August 2000.
  • 2
    • 19944372131 scopus 로고    scopus 로고
    • Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
    • July
    • De Angeli, A., Coventry, L., Johnson, G., Renaud, K., "Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems", International Journal of Human-Computer Studies, Vol.63, No.1-2, pp.128-152, July 2005.
    • (2005) International Journal of Human-Computer Studies , vol.63 , Issue.1-2 , pp. 128-152
    • De Angeli, A.1    Coventry, L.2    Johnson, G.3    Renaud, K.4
  • 3
    • 3042844145 scopus 로고    scopus 로고
    • Photographic Authentication through Untrusted Terminals
    • T.Pering, M.Sundar, J.Light and R.Want, "Photographic Authentication through Untrusted Terminals", IEEE Pervasive Computing, Vol.2, No.1, pp.30-36, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 30-36
    • Pering, T.1    Sundar, M.2    Light, J.3    Want, R.4
  • 5
    • 85084162383 scopus 로고    scopus 로고
    • D.Davis, F.Monrose and M.K.Reiter, On User Choice in Graphical Password Schemes, In proc. of 13th USENIX Security Symposium, 2004.
    • D.Davis, F.Monrose and M.K.Reiter, "On User Choice in Graphical Password Schemes", In proc. of 13th USENIX Security Symposium, 2004.
  • 6
    • 69249139151 scopus 로고    scopus 로고
    • T.S.Tullis and D.P.Tedesco, Using personal photos as pictorial passwords, In proc. of ACM CHI2005, Conference on Human Factors in Computer Systems, pp.1841-1844, 2005.
    • T.S.Tullis and D.P.Tedesco, "Using personal photos as pictorial passwords", In proc. of ACM CHI2005, Conference on Human Factors in Computer Systems, pp.1841-1844, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.