-
2
-
-
77951450757
-
Design and Analysis of a Graphical Password Scheme
-
Haichang, G., L. Xiyang, et al. (2009). "Design and Analysis of a Graphical Password Scheme", Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on Graphical Passwords.
-
(2009)
Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on Graphical Passwords
-
-
Haichang, G.1
Xiyang, L.2
-
3
-
-
79957562378
-
A Conceptual Model for Graphical Authentication
-
paper 16
-
Pierce JD, Jason G. Wells, Matthew J. Warren, & David R. Mackay. (2003). "A Conceptual Model for Graphical Authentication", 1st Australian Information security Management Conference, 24 Sept. Perth, Western Australia, paper 16.
-
(2003)
1st Australian Information Security Management Conference, 24 Sept. Perth, Western Australia
-
-
Pierce, J.D.1
Wells, J.G.2
Warren, M.J.3
Mackay, D.R.4
-
6
-
-
35248815442
-
Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images
-
Springer Berlin / Heidelberg
-
Takada, T. and H. Koike (2003). "Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images", Human-Computer Interaction with Mobile Devices and Services, Springer Berlin / Heidelberg. 2795: 347-351.
-
(2003)
Human-Computer Interaction with Mobile Devices and Services
, vol.2795
, pp. 347-351
-
-
Takada, T.1
Koike, H.2
-
8
-
-
33751429977
-
A Remote User Authentication Scheme Using Strong Graphical Passwords
-
2005. 30th Anniversary
-
Wei-Chi, K. and T. Maw-Jinn (2005). "A Remote User Authentication Scheme Using Strong Graphical Passwords", Local Computer Networks, 2005. 30th Anniversary.
-
(2005)
Local Computer Networks
-
-
Wei-Chi, K.1
Maw-Jinn, T.2
-
10
-
-
58649086514
-
On user involvement in production of images used in visual authentication
-
Renaud, K. (2009)."On user involvement in production of images used in visual authentication." J. Vis. Lang. Comput. 20(1): 1-15.
-
(2009)
J. Vis. Lang. Comput.
, vol.20
, Issue.1
, pp. 1-15
-
-
Renaud, K.1
-
12
-
-
33748107711
-
Graphical passwords based on robust discretization
-
Birget, J. C., H. Dawei, et al. (2006). "Graphical passwords based on robust discretization", Information Forensics and Security, IEEE Transactions on 1(3): 395-399.
-
(2006)
Information Forensics and Security, IEEE Transactions on
, vol.1
, Issue.3
, pp. 395-399
-
-
Birget, J.C.1
Dawei, H.2
-
13
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system", International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), 63 (2005) 102-127. (Pubitemid 40753495)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
14
-
-
33748943409
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, "Authentication using graphical passwords: Effects of tolerance and image choice", Symposium on Usable Privacy and Security (SOUPS), 6-8 July 2005, at Carnegie-Mellon Univ., Pittsburgh.
-
Symposium on Usable Privacy and Security (SOUPS), 6-8 July 2005, at Carnegie-Mellon Univ., Pittsburgh
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
|