-
1
-
-
77950846494
-
-
Jameel, H., Shaikh, R.A., Lee, H., Lee, S.: Human identification through image evaluation using secret predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 67-84. Springer, Heidelberg (2006)
-
Jameel, H., Shaikh, R.A., Lee, H., Lee, S.: Human identification through image evaluation using secret predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 67-84. Springer, Heidelberg (2006)
-
-
-
-
2
-
-
84995399871
-
Human Identification through Insecure Channel
-
Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
-
Matsumoto, T., Imai, H.: Human Identification through Insecure Channel. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 409-421. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 409-421
-
-
Matsumoto, T.1
Imai, H.2
-
3
-
-
85084161999
-
The design and analysis of graphical passwords
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: 8th USENIX Security Symposium (1999)
-
(1999)
8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
4
-
-
84957372142
-
On the Matsumoto and Imai's Human Identification Scheme
-
Guillou, L.C, Quisquater, J.-J, eds, EUROCRYPT 1995, Springer, Heidelberg
-
Wang, C.H., Hwang, T., Tsai, J.J.: On the Matsumoto and Imai's Human Identification Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 382-392. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.921
, pp. 382-392
-
-
Wang, C.H.1
Hwang, T.2
Tsai, J.J.3
-
6
-
-
0042044284
-
Practical Human-Machine Identification over Insecure Channels
-
Li, X.-Y., Teng, S.-H.: Practical Human-Machine Identification over Insecure Channels. Journal of Combinatorial Optimization 3, 347-361 (1999)
-
(1999)
Journal of Combinatorial Optimization
, vol.3
, pp. 347-361
-
-
Li, X.-Y.1
Teng, S.-H.2
-
7
-
-
70349284581
-
Secure Human Identification Protocols
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
12
-
-
33751057130
-
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
-
Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: IEEE Symposium on Security and Privacy, pp. 295-300 (2006)
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 295-300
-
-
Weinshall, D.1
-
13
-
-
79956309769
-
Cryptanalysis of a Cognitive Authentication Scheme. Cryptology ePrint Archive
-
Report 2006/258
-
Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Scheme. Cryptology ePrint Archive, Report 2006/258, http://eprint.iacr.org/
-
-
-
Golle, P.1
Wagner, D.2
-
14
-
-
84947928286
-
-
Bellare, M.: Practice-Oriented Provable-Security. In: Okamoto, E. (ed.) ISW 1997. LNCS, 1396, pp. 221-231. Springer, Heidelberg (1998)
-
Bellare, M.: Practice-Oriented Provable-Security. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 221-231. Springer, Heidelberg (1998)
-
-
-
-
15
-
-
70350678234
-
Using Image Attributes for Human Identification Protocols
-
Technical Report, CoRR abs/0704.2295
-
Jameel, H., Lee, H., Lee, S.: Using Image Attributes for Human Identification Protocols. Technical Report, CoRR abs/0704.2295 (2007), http://arxiv.org/abs/0704.2295
-
(2007)
-
-
Jameel, H.1
Lee, H.2
Lee, S.3
|