-
1
-
-
78651291233
-
Password based authentication: Philosophical Survey
-
Anand Sharma and Vibha Ojha, 2010. Password based authentication: Philosophical Survey. IEEE.
-
(2010)
IEEE
-
-
Sharma, A.1
Ojha, V.2
-
6
-
-
84866749028
-
Benchmarking of PVM and LAM/MPI Using OSCAR, Rocks and Knoppix Clustering Tools in ICCISSE XXI
-
May 25-27, 2007 Vienna, Austria
-
Muhammad Sharif and Aman Ullah Khan, 2007. Benchmarking of PVM and LAM/MPI Using OSCAR, Rocks and Knoppix Clustering Tools in ICCISSE XXI. International Conference on Computer, Information and Systems Science and Engineering May 25-27, 2007 Vienna, Austria.
-
(2007)
International Conference On Computer, Information and Systems Science and Engineering
-
-
Sharif, M.1
Khan, A.U.2
-
9
-
-
35248826508
-
A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme
-
st International Conference, 2(s): 467-472.
-
(2007)
st International Conference
, vol.2
, Issue.s
, pp. 467-472
-
-
Li, H.Z.X.1
-
10
-
-
85055796408
-
A taxonomy of replay attacks [cryptographic protocols]
-
Syverson, P., et al., 1994. A taxonomy of replay attacks [cryptographic protocols], Proceedings of Computer Security Foundations Workshop VII, CSFW, 7(s): 187-191.
-
(1994)
Proceedings of Computer Security Foundations Workshop VII, CSFW
, vol.7
, Issue.s
, pp. 187-191
-
-
Syverson, P.1
-
12
-
-
34748881847
-
A Robust Technique of Anti Key-Logging using Key-Logging Mechanism, Digital EcoSystems and Technologies Conference, 2007
-
Feb 2007
-
Baig, M.M. and W. Mahmood, 2007. A Robust Technique of Anti Key-Logging using Key-Logging Mechanism, Digital EcoSystems and Technologies Conference, 2007. DEST '07. Inaugural IEEE-IES, Feb 2007, (s): 314-318.
-
(2007)
DEST '07. Inaugural IEEE-IES
, Issue.s
, pp. 314-318
-
-
Baig, M.M.1
Mahmood, W.2
-
13
-
-
0034497380
-
A Multi Technique Approach for User Identification through Keystroke Dynamics
-
Haider, S., A. Abbas and A.K. Zaidi, 2000. A Multi Technique Approach for User Identification through Keystroke Dynamics, 2000 IEEE International Conference on Systems, Man and Cybernetics, 2(s): 1336-1341.
-
(2000)
2000 IEEE International Conference On Systems, Man and Cybernetics
, vol.2
, Issue.s
, pp. 1336-1341
-
-
Haider, S.1
Abbas, A.2
Zaidi, A.K.3
-
16
-
-
0141522840
-
GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
-
ISSN: 1098-7576
-
Enzhe Yu Sungzoon Cho, 2003. GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification, Proceedings of the International Joint Conference on Neural Networks, 2003. 3(s): 2253-2257 Vol. 3 ISSN: 1098-7576.
-
(2003)
Proceedings of the International Joint Conference On Neural Networks
, vol.3
, pp. 2253-2257
-
-
Cho, E.Y.S.1
-
17
-
-
34250789711
-
Pattern Classification Methods for Keystroke Analysis, SICE-ICASE
-
Oct. 2006
-
Tai-Hoon Cho, 2006. Pattern Classification Methods for Keystroke Analysis, SICE-ICASE, International Joint Conference Oct. 2006, (s): 3812-3815.
-
(2006)
International Joint Conference
, Issue.s
, pp. 3812-3815
-
-
Cho, T.-H.1
-
18
-
-
50149094328
-
Strengthening Passwords by Keystroke Dynamics
-
6-8 September 2007, Dortmund, Germany
-
Attila Meszaros, Zoltan Banko and Laszlo Czuni, Strengthening Passwords by Keystroke Dynamics, IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 6-8 September 2007, Dortmund, Germany.
-
IEEE International Workshop On Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
-
-
Meszaros, A.1
Banko, Z.2
Czuni, L.3
-
20
-
-
62949220947
-
Time Signatures - An Implementation of Keystroke and Click Patterns for Practical and Secure Authentication
-
13-16 November, University of east London, London UK
-
Muhammad Sharif, Tariq Faiz and Mudassar Raza, Time Signatures - An Implementation of Keystroke and Click Patterns for Practical and Secure Authentication, The third International Conference on Digital Information Management (IEEE ICDIM 2008), 13-16 November, 2008, University of east London, London UK.
-
(2008)
The Third International Conference On Digital Information Management (IEEE ICDIM 2008)
-
-
Sharif, M.1
Faiz, T.2
Raza, M.3
-
22
-
-
84866754844
-
-
June 09, 2007, at Main Campus University of Science and Technology, Bannu, NWFP, Pakistan
-
Qurat-Ul-Ain Arshad, Muhammad Sharif, Mudassar Raza and Aman Ullah Khan, 2007. Secured and Handy Graphical Password System, National Conference of Information and Communication Technologies (NCICT-2007), June 09, 2007, at Main Campus University of Science and Technology, Bannu, NWFP, Pakistan.
-
(2007)
Secured and Handy Graphical Password System, National Conference of Information and Communication Technologies (NCICT-2007)
-
-
Qurat-Ul-Ain, A.1
Sharif, M.2
Raza, M.3
Khan, A.U.4
-
26
-
-
0035575323
-
Enhanced User Authentication through Typing Biometric with Artificial Neural Networks and K- Nearest Neighbour Algorithm
-
ISBN: 0-7803-7147-X
-
Fadhli Wong Mohd Hasan Wong Supian, A.S.M. Ismail and A.F. Lai Weng Kin Ong Cheng Soon, 2001. Enhanced User Authentication through Typing Biometric with Artificial Neural Networks and K- Nearest Neighbour Algorithm, Thirty-Fifth Asilomar Conference on Signals, Systems and Computers, 2001. 2(s): 911-915 Vol. 2, ISBN: 0-7803-7147-X.
-
(2001)
Thirty-Fifth Asilomar Conference On Signals, Systems and Computers
, vol.2
, pp. 911-915
-
-
Supian, F.W.M.H.W.1
Ismail, A.S.M.2
Lai, W.K.O.3
Cheng, S.A.F.4
-
28
-
-
78651335620
-
A user authentication scheme using Multiple Passphrases and its arrangements
-
Hirotaka Tazawa and Takashi Katoh, 2010. A user authentication scheme using Multiple Passphrases and its arrangements. ISITA Taiwan.
-
(2010)
ISITA Taiwan
-
-
Tazawa, H.1
Katoh, T.2
-
29
-
-
78650582888
-
Authentication model based on reformation mapping method
-
Safdar, S., M.F. Hassan, M.A. Qureshi, R. Akbar and R. Aamir, 2010. Authentication model based on reformation mapping method "International Conference on Information and Emerging Technologies (ICIET).
-
(2010)
International Conference On Information and Emerging Technologies (ICIET)
-
-
Safdar, S.1
Hassan, M.F.2
Qureshi, M.A.3
Akbar, R.4
Aamir, R.5
-
30
-
-
77958519301
-
S3TFPAS: Scalable shoulder surfing resistant Textual-Formula base Password Authentication system
-
Shakir, M. and Abdul Ayaz Khan, 2010. S3TFPAS: Scalable shoulder surfing resistant Textual-Formula base Password Authentication system. IEEE.
-
(2010)
IEEE
-
-
Shakir, M.1
Khan, A.A.2
-
34
-
-
84866772118
-
-
http://www.datadoctor.ws/disk-data-recovery/keylogger.html.
-
-
-
-
35
-
-
84866754849
-
-
http://newsdesk.si.edu/images_full/images/museums/nmah/treasures/morse_telegraph_key.jpg.
-
-
-
|