-
2
-
-
54249122575
-
User identification based on handwritten signatures with haptic information
-
Haptics: Perception, Devices and Scenarios, 6th International Conference, EuroHaptics 2008, Proceedings, Springer
-
F. A. Alsulaiman, J. Cha and A. El Saddik. User identification based on handwritten signatures with haptic information. In Haptics: Perception, Devices and Scenarios, 6th International Conference, EuroHaptics 2008, Proceedings, Volume 5024 of Lecture Notes in Computer Science, 114-121, Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5024
, pp. 114-121
-
-
Alsulaiman, F.A.1
Cha, J.2
El Saddik, A.3
-
3
-
-
0028532579
-
Why cryptosystems fail
-
R. J. Anderson. Why cryptosystems fail. Communications of the ACM, 37(11): 32-49, 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 32-49
-
-
Anderson, R.J.1
-
4
-
-
85037151582
-
Cryptanalysis of the Convex Hull Click human identification protocol
-
Information Security, 13th International Conference, ISC 2010, Revised Selected Papers, Springer
-
H. J. Asghar, S. Li, J. Pieprzyk and H. Wang. Cryptanalysis of the Convex Hull Click human identification protocol. In Information Security, 13th International Conference, ISC 2010, Revised Selected Papers, Volume 6531 of Lecture Notes in Computer Science, 24-30, Springer, 2011.
-
(2011)
Lecture Notes in Computer Science
, vol.6531
, pp. 24-30
-
-
Asghar, H.J.1
Li, S.2
Pieprzyk, J.3
Wang, H.4
-
5
-
-
79251568392
-
A new human identification protocol and Coppersmith's baby-step giant-step algorithm
-
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Proceedings, Springer
-
H. J. Asghar, J. Pieprzyk and H. Wang. A new human identification protocol and Coppersmith's baby-step giant-step algorithm. In Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Proceedings, Volume 6123 of Lecture Notes in Computer Science, 349-366, Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6123
, pp. 349-366
-
-
Asghar, H.J.1
Pieprzyk, J.2
Wang, H.3
-
7
-
-
60649085571
-
PAS: Predicate-based Authentication Services against powerful passive adversaries
-
IEEE Computer Society
-
X. Bai, W. Gu, S. Chellappan, X. Wang, D. Xuan and B. Ma. PAS: Predicate-based Authentication Services against powerful passive adversaries. In Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC'2008), 433-442, IEEE Computer Society, 2008.
-
(2008)
Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC'2008)
, pp. 433-442
-
-
Bai, X.1
Gu, W.2
Chellappan, S.3
Wang, X.4
Xuan, D.5
Ma, B.6
-
8
-
-
77953087187
-
The Haptic wheel: Design & evaluation of a tactile password system
-
ACM
-
A. Bianchi, J. K. Lee, I. Oakley and D. S. Kwon. The Haptic wheel: design & evaluation of a tactile password system. In Proceedings of the 28th International Conference on Human Factors in Computing Systems: Extended Abstracts (CHI EA'2010), 3525-3530, ACM, 2010.
-
(2010)
Proceedings of the 28th International Conference on Human Factors in Computing Systems: Extended Abstracts (CHI EA'2010)
, pp. 3525-3530
-
-
Bianchi, A.1
Lee, J.K.2
Oakley, I.3
Kwon, D.S.4
-
9
-
-
79952356972
-
The Phone Lock: Audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices
-
ACM
-
A. Bianchi, I. Oakley, V. Kostakos and D. S. Kwon. The Phone Lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices. In Proceedings of the 5th International Conference on Tangible, Embedded, and Embodied Interaction (TEI'2011), 197-200, ACM, 2011.
-
(2011)
Proceedings of the 5th International Conference on Tangible, Embedded, and Embodied Interaction (TEI'2011)
, pp. 197-200
-
-
Bianchi, A.1
Oakley, I.2
Kostakos, V.3
Kwon, D.S.4
-
15
-
-
70350726610
-
Accessible authentication via tactile pin entry
-
T. Deyle and V. Roth. Accessible authentication via tactile pin entry. Computer Graphics Topics, Issue 3, 2006. http://www.zgdv.de/PDFs/topics/2006/ topics3-2006.pdf.
-
(2006)
Computer Graphics Topics
, Issue.3
-
-
Deyle, T.1
Roth, V.2
-
22
-
-
65449162720
-
Use Your Illusion: Secure authentication usable anywhere
-
ACM
-
E. Hayashi, N. Christin, R. Dhamija and A. Perrig. Use Your Illusion: secure authentication usable anywhere. In Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS'2008), 35-45, ACM, 2008.
-
(2008)
Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS'2008)
, pp. 35-45
-
-
Hayashi, E.1
Christin, N.2
Dhamija, R.3
Perrig, A.4
-
23
-
-
70349284581
-
Secure human identification protocols
-
Advances in Cryptology - ASIACRYPT 2001, Springer
-
N. J. Hopper and M. Blum. Secure human identification protocols. In Advances in Cryptology - ASIACRYPT 2001, Volume 2248 of Lecture Notes in Computer Science, 52-66, Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
25
-
-
77950846494
-
Human Identification through image evaluation using secret predicates
-
Topics in Cryptology - CT-RSA 2007
-
H. Jameel, R. Shaikh, H. Lee and S. Lee. Human Identification through image evaluation using secret predicates. In Topics in Cryptology - CT-RSA 2007, Volume 4377 of Lecture Notes in Computer Science, 67-84, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4377
, pp. 67-84
-
-
Jameel, H.1
Shaikh, R.2
Lee, H.3
Lee, S.4
-
26
-
-
70350647479
-
Image-feature based human identification protocols on limited display devices
-
Information Security Applications, 9th International Workshop, WISA 2008, Revised Selected Papers, Springer
-
H. Jameel, R. Shaikh, L. Hung, Y. Wei, S, Raazi, N. Canh, S. Lee, H. Lee, Y. Son and M. Fernandes. Image-feature based human identification protocols on limited display devices. In Information Security Applications, 9th International Workshop, WISA 2008, Revised Selected Papers, Volume 5379 of Lecture Notes in Computer Science, 211-224, Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5379
, pp. 211-224
-
-
Jameel, H.1
Shaikh, R.2
Hung, L.3
Wei, Y.4
Raazi, S.5
Canh, N.6
Lee, S.7
Lee, H.8
Son, Y.9
Fernandes, M.10
-
30
-
-
51249089651
-
A virtual password scheme to protect passwords
-
IEEE
-
M. Lei, Y. Xiao, S. V. Vrbsky, C.-C. Li and L. Liu. A virtual password scheme to protect passwords. In Proceedings of 2008 IEEE International Conference on Communications (ICC'2008), 1536-1540, IEEE, 2008.
-
(2008)
Proceedings of 2008 IEEE International Conference on Communications (ICC'2008)
, pp. 1536-1540
-
-
Lei, M.1
Xiao, Y.2
Vrbsky, S.V.3
Li, C.-C.4
Liu, L.5
-
31
-
-
77950838084
-
On the security of PAS (Predicate-based Authentication Service)
-
IEEE Computer Society
-
S. Li, H. J. Asghar, J. Pieprzyk, A.-R. Sadeghi, R. Schmitz and H. Wang. On the security of PAS (Predicate-based Authentication Service). In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC'2009), 209-218, IEEE Computer Society, 2009.
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC'2009)
, pp. 209-218
-
-
Li, S.1
Asghar, H.J.2
Pieprzyk, J.3
Sadeghi, A.-R.4
Schmitz, R.5
Wang, H.6
-
34
-
-
33751034055
-
Secure Human-Computer Identification (Interface) systems against peeping attacks: SecHCI
-
ePrint Archive: Report 2005/268
-
S. Li and H.-Y. Shum. Secure Human-Computer Identification (Interface) systems against peeping attacks: SecHCI. IACR's Cryptology ePrint Archive: Report 2005/268, 2005.
-
(2005)
IACR's Cryptology
-
-
Li, S.1
Shum, H.-Y.2
-
35
-
-
0042044284
-
Practical human-machine identification over insecure channels
-
X.-Y. Li and S.-H. Teng. Practical human-machine identification over insecure channels. Journal of Combinatorial Optimization, 3(4):347-361, 1998.
-
(1998)
Journal of Combinatorial Optimization
, vol.3
, Issue.4
, pp. 347-361
-
-
Li, X.-Y.1
Teng, S.-H.2
-
36
-
-
57749106834
-
Novel shoulder-surfing resistant haptic-based graphical password
-
EuroHaptics Society
-
B. Malek, M. Orozco and A. El Saddik. Novel shoulder-surfing resistant haptic-based graphical password, In Proceedings of EuroHaptics'2006, 179-184, EuroHaptics Society, 2006.
-
(2006)
Proceedings of EuroHaptics'2006
, pp. 179-184
-
-
Malek, B.1
Orozco, M.2
El Saddik, A.3
-
38
-
-
84995399871
-
Human identification through insecure channel
-
Advances in Cryptology -EUROCRYPT'91, Springer
-
T. Matsumoto and H. Imai. Human identification through insecure channel. In Advances in Cryptology -EUROCRYPT'91, Volume 547 of Lecture Notes in Computer Science, 409-421, Springer, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 409-421
-
-
Matsumoto, T.1
Imai, H.2
-
41
-
-
77955322016
-
Shoulder-surfing safe login in a partially observable attacker model
-
Financial Cryptography and Data Security: 14th International Conference, FC 2010, Revised Selected Papers, Springer
-
T. Perković, M. Čagalj and N. Saxena. Shoulder-surfing safe login in a partially observable attacker model. In Financial Cryptography and Data Security: 14th International Conference, FC 2010, Revised Selected Papers, Volume 6052 of Lecture Notes in Computer Science, 351-358, Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6052
, pp. 351-358
-
-
Perković, T.1
Čagalj, M.2
Saxena, N.3
-
46
-
-
84957372142
-
On the Matsumoto and Imai's human identification scheme
-
Advances in Cryptology - EUROCRYPT'95, Springer
-
C.-H. Wang, T. Hwang and J.-J. Tsai. On the Matsumoto and Imai's human identification scheme. In Advances in Cryptology - EUROCRYPT'95, Volume 921 of Lecture Notes in Computer Science, 382-392, Springer, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 382-392
-
-
Wang, C.-H.1
Hwang, T.2
Tsai, J.-J.3
-
48
-
-
34247167942
-
Design and evaluation of a shoulder-surfing resistant graphical password scheme
-
ACM
-
S. Wiedenbeck, J. Waters, L. Sobrado and J.-C. Birget. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proceedings of International Working Conference on Advanced Visual Interfaces (AVI'2006), 177- 184, ACM, 2006.
-
(2006)
Proceedings of International Working Conference on Advanced Visual Interfaces (AVI'2006)
, pp. 177-184
-
-
Wiedenbeck, S.1
Waters, J.2
Sobrado, L.3
Birget, J.-C.4
|