메뉴 건너뛰기




Volumn , Issue , 2010, Pages 79-86

2-clickAuth - Optical challenge-response authentication

Author keywords

Authentication; Federated identity management; OpenID; QR code; Trusted device

Indexed keywords

CAMERA PHONE; CHALLENGE RESPONSE; EASE-OF-USE; FACEBOOK; FEDERATED IDENTITY; INTERNET USERS; LARGE AMOUNTS OF DATA; MALWARES; OPENID; QR CODES; SECURE AUTHENTICATION METHODS; SHORT PERIODS; SOURCEFORGE; WEB CAMERA;

EID: 77952418081     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2010.85     Document Type: Conference Paper
Times cited : (19)

References (22)
  • 1
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • J. Yan, A. Blackwell, R. Anderson and A. Grant. "Password memorability and security: Empirical results". IEEE Security and Privacy, vol. 2, no. 5, 25-31, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4
  • 2
    • 30344473624 scopus 로고    scopus 로고
    • Federated identity management
    • S. Shim, G. Bhalla, and V. Pendyala, "Federated Identity Management", Computer, vol. 38, no. 12, 2005.
    • (2005) Computer , vol.38 , Issue.12
    • Shim, S.1    Bhalla, G.2    Pendyala, V.3
  • 3
    • 77952338541 scopus 로고    scopus 로고
    • [Online]. Available [Accessed: Sept 16]
    • OpenID Foundation, "Get an OpenID". [Online]. Available: http://openid.net/get-an-openid [Accessed: Sept 16, 2009]
    • (2009) Get an openID
  • 4
    • 77952335773 scopus 로고    scopus 로고
    • [Online] Available [Assecced: Sept 25]
    • L. Drebes, "Relying Party Stats as of Jan 1st, 2009" [Online] Available: http://blog.janrain.com/2009/01/relying-party-stats-as-of-jan-1st- 2008.html [Assecced: Sept 25, 2009]
    • (2009) Relying Party Stats as of Jan 1st, 2009
    • Drebes, L.1
  • 5
    • 77952405049 scopus 로고    scopus 로고
    • [Online]. Available [Accessed: Sept 16]
    • "Bluetooth.com" [Online]. Available: http://www.bluetooth.com [Accessed: Sept 16, 2009]
    • (2009)
  • 10
    • 77952331541 scopus 로고    scopus 로고
    • [Online]. Available [Accessed: Sept 21]
    • "IRDA", Infrared Data Association. [Online]. Available: http://www.irda.org [Accessed: Sept 21, 2009]
    • (2009) Infrared Data Association
  • 11
    • 77952405533 scopus 로고    scopus 로고
    • [Online]. Available [Accessed: Sept 6]
    • "NFC Forum" [Online]. Available: http://www.nfc-forum.org [Accessed: Sept 6, 2009]
    • (2009)
  • 12
    • 50049087364 scopus 로고    scopus 로고
    • On mobile viruses exploiting messaging and bluetooth services
    • Baltimore
    • A. Bose, K. G. Shin. "On Mobile Viruses Exploiting Messaging and Bluetooth Services," in Securecomm and Workshops, Baltimore, 2006, pp. 1-10.
    • (2006) Securecomm and Workshops , pp. 1-10
    • Bose, A.1    Shin, K.G.2
  • 13
    • 77952409403 scopus 로고    scopus 로고
    • [Online]. Available [Accessed: Sept 21]
    • "GS1" [Online]. Available: http://www.gs1.org/barcodes [Accessed: Sept 21, 2009]
    • (2009)
  • 14
    • 77952396647 scopus 로고    scopus 로고
    • [Online]. Available [Accessed: Sept 16]
    • Denso Wave Inc, "QR Code.com". [Online]. Available: http://www.denso-wave.com/qrcode/index-e.html [Accessed: Sept 16, 2009]
    • (2009) QR Code.com
  • 15
    • 77952356033 scopus 로고    scopus 로고
    • [Online]. Available [Accessed: Dec 8]
    • Optical Challenge-Response. [Online]. Available: http://www.ida.liu.se/ divisions/adit/authentication [Accessed: Dec 8, 2009]
    • (2009) Optical Challenge-Response
  • 16
    • 77952333351 scopus 로고    scopus 로고
    • [Online]. Available [Accessed: Sept 21]
    • Google Code, "ZXing". [Online]. Available: http://code.google. com/p/zxing/ [Accessed: Sept 21, 2009]
    • (2009) ZXing
  • 17
    • 77952376957 scopus 로고    scopus 로고
    • [Online]. Available [Accessed: Sept 21]
    • Google Code, "Joid". [Online]. Available: http://code.google. com/p/joid/ [Accessed: Sept 21, 2009]
    • (2009) Joid
  • 20
    • 84958955276 scopus 로고    scopus 로고
    • The untrusted computer problem and camera-based authentication
    • M. Burnside et al., "The Untrusted Computer Problem and Camera-Based Authentication," in Pervasive Computing, LNCS, vol. 2414, pp. 114-124, 2002.
    • (2002) Pervasive Computing, LNCS , vol.2414 , pp. 114-124
    • Burnside, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.