메뉴 건너뛰기




Volumn , Issue , 2008, Pages

A study of password authentication method against observing attacks

Author keywords

Observing attacks; Password authentication method

Indexed keywords

AUTHENTICATION METHODS; ENTRY OPERATIONS; INTERNET SERVICES; MINIATURE CAMERAS; MOBILE ENVIRONMENTS; OBSERVING ATTACKS; PASSWORD AUTHENTICATION METHOD; SECURITY STRENGTHS; USER AUTHENTICATIONS;

EID: 58049201945     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SISY.2008.4664927     Document Type: Conference Paper
Times cited : (11)

References (9)
  • 1
    • 58049195506 scopus 로고    scopus 로고
    • Improvements and Evaluation of Authentication Method for Mobile Phones
    • in Japanese, Oct
    • S. Sakurai, M. Yoshida, T. Munaka, "Improvements and Evaluation of Authentication Method for Mobile Phones ", Computer security symposium 2004, pp.625-630, Oct, 2004. (in Japanese)
    • (2004) Computer security symposium 2004 , pp. 625-630
    • Sakurai, S.1    Yoshida, M.2    Munaka, T.3
  • 3
    • 35248815442 scopus 로고    scopus 로고
    • T. Takada, H. Koike, Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images, LNCS2795.Human-Computer Interaction with Mobile Devices and Services, pp.347-351, Springer, 2003.
    • T. Takada, H. Koike, "Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images", LNCS2795.Human-Computer Interaction with Mobile Devices and Services, pp.347-351, Springer, 2003.
  • 4
    • 0002618895 scopus 로고    scopus 로고
    • Deja vu:A User Study Using Images for Authentication
    • Rachna Dhamija, Adrian Perrig, "Deja vu:A User Study Using Images for Authentication", 9th USENIX Security Symposium, pp.45-58, 2002.
    • (2002) 9th USENIX Security Symposium , pp. 45-58
    • Dhamija, R.1    Perrig, A.2
  • 5
    • 3042844145 scopus 로고    scopus 로고
    • Trevor Pering, Murali Sundar,John Light, and Roy Want, Photographic Authentication through Untrusted Terminals, IEEE Pervasive Computing, 2.no.1, pp.30-36, Jan, 2003.
    • Trevor Pering, Murali Sundar,John Light, and Roy Want, "Photographic Authentication through Untrusted Terminals", IEEE Pervasive Computing, vol 2.no.1, pp.30-36, Jan, 2003.
  • 6
    • 57049144993 scopus 로고    scopus 로고
    • Spy-resistant keyboard: More secure password entry on public touch screen displays
    • Nov
    • Desney S. Tan, Pedram Keyani, Mary Czerwinsky, "Spy-resistant keyboard: more secure password entry on public touch screen displays", Proceeding of OZCHI 2005, pp.1-10, Nov, 2005.
    • (2005) Proceeding of OZCHI 2005 , pp. 1-10
    • Tan, D.S.1    Keyani, P.2    Czerwinsky, M.3
  • 9
    • 38049018121 scopus 로고    scopus 로고
    • Kuo Wen-Chung, Lee yung-Chenq, Attack and Improvement on the One-Time Password Authentication Protocol Against Theft Attacks, International Conference on Machine Learning and Cybernetics, pp.1918-1922, Aug, 2007.
    • Kuo Wen-Chung, Lee yung-Chenq, "Attack and Improvement on the One-Time Password Authentication Protocol Against Theft Attacks", International Conference on Machine Learning and Cybernetics, pp.1918-1922, Aug, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.