-
1
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson and A. Grant. "Password memorability and security: Empirical results". IEEE Security and Privacy, vol. 2, no. 5, 25-31, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
2
-
-
30344473624
-
Federated identity management
-
S. Shim, G. Bhalla, and V. Pendyala, "Federated Identity Management", Computer, vol. 38, no. 12, 2005.
-
(2005)
Computer
, vol.38
, Issue.12
-
-
Shim, S.1
Bhalla, G.2
Pendyala, V.3
-
3
-
-
77952338541
-
-
[Online]. Available [Accessed: Sept 16]
-
OpenID Foundation, "Get an OpenID". [Online]. Available: http://openid.net/get-an-openid [Accessed: Sept 16, 2009]
-
(2009)
Get an openID
-
-
-
4
-
-
77952335773
-
-
[Online] Available [Assecced: Sept 25]
-
L. Drebes, "Relying Party Stats as of Jan 1st, 2009" [Online] Available: http://blog.janrain.com/2009/01/relying-party-stats-as-of-jan-1st- 2008.html [Assecced: Sept 25, 2009]
-
(2009)
Relying Party Stats as of Jan 1st, 2009
-
-
Drebes, L.1
-
5
-
-
77952405049
-
-
[Online]. Available [Accessed: Sept 16]
-
"Bluetooth.com" [Online]. Available: http://www.bluetooth.com [Accessed: Sept 16, 2009]
-
(2009)
-
-
-
7
-
-
44349140199
-
-
Dec. [Online]. Available
-
D. M'Raihi, M. Bellare, F. Hoornaert, D. Naccache, and O. Ranen, "HOTP: An HMAC-Based One-Time Password Algorithm", RFC 4226, Dec. 2005. [Online]. Available: http://www.ietf.org/rfc/rfc4226.txt
-
(2005)
HOTP: An HMAC-Based one-Time Password Algorithm
-
-
M'Raihi, D.1
Bellare, M.2
Hoornaert, F.3
Naccache, D.4
Ranen, O.5
-
10
-
-
77952331541
-
-
[Online]. Available [Accessed: Sept 21]
-
"IRDA", Infrared Data Association. [Online]. Available: http://www.irda.org [Accessed: Sept 21, 2009]
-
(2009)
Infrared Data Association
-
-
-
11
-
-
77952405533
-
-
[Online]. Available [Accessed: Sept 6]
-
"NFC Forum" [Online]. Available: http://www.nfc-forum.org [Accessed: Sept 6, 2009]
-
(2009)
-
-
-
12
-
-
50049087364
-
On mobile viruses exploiting messaging and bluetooth services
-
Baltimore
-
A. Bose, K. G. Shin. "On Mobile Viruses Exploiting Messaging and Bluetooth Services," in Securecomm and Workshops, Baltimore, 2006, pp. 1-10.
-
(2006)
Securecomm and Workshops
, pp. 1-10
-
-
Bose, A.1
Shin, K.G.2
-
13
-
-
77952409403
-
-
[Online]. Available [Accessed: Sept 21]
-
"GS1" [Online]. Available: http://www.gs1.org/barcodes [Accessed: Sept 21, 2009]
-
(2009)
-
-
-
14
-
-
77952396647
-
-
[Online]. Available [Accessed: Sept 16]
-
Denso Wave Inc, "QR Code.com". [Online]. Available: http://www.denso-wave.com/qrcode/index-e.html [Accessed: Sept 16, 2009]
-
(2009)
QR Code.com
-
-
-
15
-
-
77952356033
-
-
[Online]. Available [Accessed: Dec 8]
-
Optical Challenge-Response. [Online]. Available: http://www.ida.liu.se/ divisions/adit/authentication [Accessed: Dec 8, 2009]
-
(2009)
Optical Challenge-Response
-
-
-
16
-
-
77952333351
-
-
[Online]. Available [Accessed: Sept 21]
-
Google Code, "ZXing". [Online]. Available: http://code.google. com/p/zxing/ [Accessed: Sept 21, 2009]
-
(2009)
ZXing
-
-
-
17
-
-
77952376957
-
-
[Online]. Available [Accessed: Sept 21]
-
Google Code, "Joid". [Online]. Available: http://code.google. com/p/joid/ [Accessed: Sept 21, 2009]
-
(2009)
Joid
-
-
-
19
-
-
67249133588
-
Simple strong authentication for internet applications using mobile phones
-
New Orleans
-
D. van Thanh, T. Jonvik, B. Feng, D. van Thuan, and I. Jorstad, "Simple Strong Authentication for Internet Applications Using Mobile Phones", in Global Telecommunications Conference (IEEE GLOBECOM), New Orleans, 2008.
-
(2008)
Global Telecommunications Conference (IEEE GLOBECOM)
-
-
Van Thanh, D.1
Jonvik, T.2
Feng, B.3
Van Thuan, D.4
Jorstad, I.5
-
20
-
-
84958955276
-
The untrusted computer problem and camera-based authentication
-
M. Burnside et al., "The Untrusted Computer Problem and Camera-Based Authentication," in Pervasive Computing, LNCS, vol. 2414, pp. 114-124, 2002.
-
(2002)
Pervasive Computing, LNCS
, vol.2414
, pp. 114-124
-
-
Burnside, M.1
-
21
-
-
70349653942
-
QR-TAN: Secure mobile transaction authentication
-
Fukuoka
-
G. Starnberger, L. Froihofer, and K. M. Goeschka, "QR-TAN: Secure Mobile Transaction Authentication," in Fourth International Workshop on Frontiers in Availability, Reliability and Security (FARES 2009), Fukuoka, 2009, pp. 578-583.
-
(2009)
Fourth International Workshop on Frontiers in Availability, Reliability and Security (FARES 2009)
, pp. 578-583
-
-
Starnberger, G.1
Froihofer, L.2
Goeschka, K.M.3
|