메뉴 건너뛰기




Volumn , Issue , 2005, Pages 334-340

Screen oriented technique for reducing the incidence of shoulder surfing

Author keywords

Graphical passwords; Information security; Shoulder surfing

Indexed keywords

AUTHORIZED USERS; DICTIONARY ATTACKS; GRAPHICAL OBJECTS; GRAPHICAL PASSWORDS; GUESSING ATTACKS; INFORMATION SECURITY; SEARCH TIME; SHOULDER SURFING;

EID: 62349096287     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (10)
  • 1
    • 56349170075 scopus 로고    scopus 로고
    • Comparison of Holistic and Feature Based Approaches to Face Recognition
    • thesis, School of Computer Science and Information Technology, Faculty of Applied Science, Royal Melbourne Institute of Technology University, Melbourne, Victoria, Australia, July
    • S. Tseng, "Comparison of Holistic and Feature Based Approaches to Face Recognition," Masters of Applied Science in Information Technology thesis, School of Computer Science and Information Technology, Faculty of Applied Science, Royal Melbourne Institute of Technology University, Melbourne, Victoria, Australia, July 2003
    • (2003) Masters of Applied Science in Information Technology
    • Tseng, S.1
  • 2
    • 0018543411 scopus 로고
    • Password Security: A Case History
    • R. Morris and K. Thompson, "Password Security: A Case History", Communications of the ACM, vol. 22(11), pp. 594-597, 1979
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 3
    • 12244260624 scopus 로고    scopus 로고
    • Graphical Passwords
    • United States Patent 5559961
    • G. Blonder, "Graphical Passwords". United States Patent 5559961 (1996).
    • (1996)
    • Blonder, G.1
  • 4
    • 85084163855 scopus 로고    scopus 로고
    • Graphical Dictionaries and the Memorable Space of Graphical Passwords
    • San Diego, USA, August 9-13
    • J. Thorpe and P. van Oorschot, "Graphical Dictionaries and the Memorable Space of Graphical Passwords," in Proceedings of the 13th USENIX Security Symposium, San Diego, USA, August 9-13, 2004, pp. 135-150
    • (2004) Proceedings of the 13th USENIX Security Symposium , pp. 135-150
    • Thorpe, J.1    van Oorschot, P.2
  • 6
    • 33751051139 scopus 로고    scopus 로고
    • Authenticating Mobile Device Users through Image Selection
    • K. Morgan & M. J. Spector Editors, 10 pp
    • W. Jansen, "Authenticating Mobile Device Users through Image Selection," in The Internet Society: Advances in Learning, Commerce and Security, K. Morgan & M. J. Spector (Editors), vol. 30, 2004, 10 pp
    • (2004) The Internet Society: Advances in Learning, Commerce and Security , vol.30
    • Jansen, W.1
  • 7
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • N. Hopper and M. Blum, "Secure Human Identification Protocols," ASIACRYPT 2001, pp. 52-66
    • ASIACRYPT 2001 , pp. 52-66
    • Hopper, N.1    Blum, M.2
  • 8
    • 14844324416 scopus 로고    scopus 로고
    • A Secure HumanComputer Authentication Scheme
    • CMU-CS-00-139
    • N. Hopper and M. Blum, "A Secure HumanComputer Authentication Scheme" CMU Tech Report CMU-CS-00-139
    • CMU Tech Report
    • Hopper, N.1    Blum, M.2
  • 9
    • 7544243600 scopus 로고    scopus 로고
    • Graphical passwords
    • retrieved online on April 14, 2005 at
    • L. Sobrado and J.-C Birget, "Graphical passwords," The Rutgers Scholar, vol 4, 2002, retrieved online on April 14, 2005 at http://rutgersscholar.rutgers.edu/volume04/sobrbi rg/sobrbirg.htm
    • (2002) The Rutgers Scholar , vol.4
    • Sobrado, L.1    Birget, J.-C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.