-
3
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Fiat, A., and Shamir, A. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO (1986), pp. 186-194.
-
(1986)
CRYPTO
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
4
-
-
0021481768
-
Pass-algorithms: A user validation scheme based on knowledge of secret algorithms
-
Haskett, J. A. Pass-algorithms: A user validation scheme based on knowledge of secret algorithms. Communications of the ACM 8, 27 (1984), 777-781.
-
(1984)
Communications of the ACM
, vol.8
, Issue.27
, pp. 777-781
-
-
Haskett, J. A.1
-
5
-
-
34547336952
-
Computers and privacy: A survey
-
Hoffman, L. J. Computers and privacy: A survey. ACM Comput. Surv. 1, 2 (1969), 85-103.
-
(1969)
ACM Comput. Surv
, vol.1
, Issue.2
, pp. 85-103
-
-
Hoffman, L. J.1
-
8
-
-
33751034055
-
Secure human-computer identification (interface) systems against peeping attacks: Sechci
-
Report 2005/268
-
Li, S., and Shum, H.-Y. Secure human-computer identification (interface) systems against peeping attacks: Sechci. Cryptology ePrint Archive, Report 2005/268, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology ePrint Archive
-
-
Li, S.1
Shum, H.-Y.2
-
9
-
-
0042044284
-
Practical human-machine identification over insecure channels
-
Li, X.-Y., and Teng, S.-H. Practical human-machine identification over insecure channels. J. Comb. Optim. 3, 4 (1999), 347-361.
-
(1999)
J. Comb. Optim
, vol.3
, Issue.4
, pp. 347-361
-
-
Li, X.-Y.1
Teng, S.-H.2
-
10
-
-
84909753781
-
Logical authentication method
-
Lipton, D. Logical authentication method. SIGSAC Rev. 4, 2 (1986), 9-20.
-
(1986)
SIGSAC Rev
, vol.4
, Issue.2
, pp. 9-20
-
-
Lipton, D.1
-
12
-
-
84995399871
-
Human identification through insecure channel
-
Matsumoto, T., and Imai, H. Human identification through insecure channel. In EUROCRYPT (1991), pp. 409-421.
-
(1991)
EUROCRYPT
, pp. 409-421
-
-
Matsumoto, T.1
Imai, H.2
-
13
-
-
84976815513
-
Security considerations in a multiprogrammed computer system
-
(Washington, D.C), Thompson Book Co
-
Peters, B. Security considerations in a multiprogrammed computer system. In Proc. AFIPS 1967 Spring Joint Comput. Conf. (Washington, D.C., 1967), Thompson Book Co.
-
(1967)
Proc. AFIPS 1967 Spring Joint Comput. Conf
-
-
Peters, B.1
-
14
-
-
14844314151
-
A pin-entry method resilient against shoulder surfing
-
(New York, NY, USA), ACM Press
-
Roth, V., Richter, K., and Freidinger, R. A pin-entry method resilient against shoulder surfing. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security (New York, NY, USA, 2004), ACM Press, pp. 236-245.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 236-245
-
-
Roth, V.1
Richter, K.2
Freidinger, R.3
-
18
-
-
84957372142
-
On the matsumoto and imai's human identification scheme
-
Wang, C.-H., Hwang, T., and Tsai, J.-J. On the matsumoto and imai's human identification scheme. In EUROCRYPT (1995), pp. 382-392.
-
(1995)
EUROCRYPT
, pp. 382-392
-
-
Wang, C.-H.1
Hwang, T.2
Tsai, J.-J.3
|