-
1
-
-
56349170075
-
Comparison of Holistic and Feature Based Approaches to Face Recognition
-
thesis, School of Computer Science and Information Technology, Faculty of Applied Science, Royal Melbourne Institute of Technology University, Melbourne, Victoria, Australia, July
-
S. Tseng, "Comparison of Holistic and Feature Based Approaches to Face Recognition," Masters of Applied Science in Information Technology thesis, School of Computer Science and Information Technology, Faculty of Applied Science, Royal Melbourne Institute of Technology University, Melbourne, Victoria, Australia, July 2003
-
(2003)
Masters of Applied Science in Information Technology
-
-
Tseng, S.1
-
2
-
-
0018543411
-
Password Security: A Case History
-
R. Morris and K. Thompson, "Password Security: A Case History", Communications of the ACM, vol. 22(11), pp. 594-597, 1979
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
3
-
-
12244260624
-
Graphical Passwords
-
United States Patent 5559961
-
G. Blonder, "Graphical Passwords". United States Patent 5559961 (1996).
-
(1996)
-
-
Blonder, G.1
-
4
-
-
85084163855
-
Graphical Dictionaries and the Memorable Space of Graphical Passwords
-
San Diego, USA, August 9-13
-
J. Thorpe and P. van Oorschot, "Graphical Dictionaries and the Memorable Space of Graphical Passwords," in Proceedings of the 13th USENIX Security Symposium, San Diego, USA, August 9-13, 2004, pp. 135-150
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 135-150
-
-
Thorpe, J.1
van Oorschot, P.2
-
5
-
-
85084161999
-
The Design and Analysis of Graphical Passwords
-
L. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, "The Design and Analysis of Graphical Passwords," in the 8th USENIX Security Symposium, 1999
-
(1999)
8th USENIX Security Symposium
-
-
Jermyn, L.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
6
-
-
33751051139
-
Authenticating Mobile Device Users through Image Selection
-
K. Morgan & M. J. Spector Editors, 10 pp
-
W. Jansen, "Authenticating Mobile Device Users through Image Selection," in The Internet Society: Advances in Learning, Commerce and Security, K. Morgan & M. J. Spector (Editors), vol. 30, 2004, 10 pp
-
(2004)
The Internet Society: Advances in Learning, Commerce and Security
, vol.30
-
-
Jansen, W.1
-
7
-
-
70349284581
-
Secure Human Identification Protocols
-
N. Hopper and M. Blum, "Secure Human Identification Protocols," ASIACRYPT 2001, pp. 52-66
-
ASIACRYPT 2001
, pp. 52-66
-
-
Hopper, N.1
Blum, M.2
-
8
-
-
14844324416
-
A Secure HumanComputer Authentication Scheme
-
CMU-CS-00-139
-
N. Hopper and M. Blum, "A Secure HumanComputer Authentication Scheme" CMU Tech Report CMU-CS-00-139
-
CMU Tech Report
-
-
Hopper, N.1
Blum, M.2
-
9
-
-
7544243600
-
Graphical passwords
-
retrieved online on April 14, 2005 at
-
L. Sobrado and J.-C Birget, "Graphical passwords," The Rutgers Scholar, vol 4, 2002, retrieved online on April 14, 2005 at http://rutgersscholar.rutgers.edu/volume04/sobrbi rg/sobrbirg.htm
-
(2002)
The Rutgers Scholar
, vol.4
-
-
Sobrado, L.1
Birget, J.-C.2
|