메뉴 건너뛰기




Volumn 41, Issue 7, 2014, Pages 3561-3568

Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system

Author keywords

Access control system; Cryptography; Graphical password; NFC enabled smartphone; Steganography; Two factor authentication

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; BEHAVIORAL RESEARCH; CONTROL SYSTEMS; CRYPTOGRAPHY; ELECTRONICS INDUSTRY; EXPERT SYSTEMS; MOBILE SECURITY; SMARTPHONES; STEGANOGRAPHY;

EID: 84892368378     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2013.10.060     Document Type: Article
Times cited : (37)

References (30)
  • 2
    • 19944372131 scopus 로고    scopus 로고
    • Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
    • DOI 10.1016/j.ijhcs.2005.04.020, PII S1071581905000704, HCI Research in Privacy and Security
    • A.D. Angeli, L. Coventry, G. Johnson, and K. Renaud Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems International Journal of Human-Computer Studies 63 1-2 2005 128 152 (Pubitemid 40753496)
    • (2005) International Journal of Human Computer Studies , vol.63 , Issue.1-2 , pp. 128-152
    • De Angeli, A.1    Coventry, L.2    Johnson, G.3    Renaud, K.4
  • 3
    • 84892366278 scopus 로고    scopus 로고
    • Biometrics: An overview of the technology, issues and applications
    • S. Asha, and C. Chellappan Biometrics: An overview of the technology, issues and applications International Journal of Computer Applications 39 10 2012 35 52
    • (2012) International Journal of Computer Applications , vol.39 , Issue.10 , pp. 35-52
    • Asha, S.1    Chellappan, C.2
  • 5
    • 84862077892 scopus 로고    scopus 로고
    • A gesture controlled user interface for inclusive design and evaluation study of its usability
    • M. Bhuiyan, and R. Picking A gesture controlled user interface for inclusive design and evaluation study of its usability Journal of Software Engineering and Applications 4 2011 513 521
    • (2011) Journal of Software Engineering and Applications , vol.4 , pp. 513-521
    • Bhuiyan, M.1    Picking, R.2
  • 7
    • 71549122290 scopus 로고    scopus 로고
    • High payload steganography mechanism using hybrid edge detector
    • W.-J. Chen, C.-C. Chang, and T.H.N. Le High payload steganography mechanism using hybrid edge detector Expert Systems with Applications 37 2010 3292 3301
    • (2010) Expert Systems with Applications , vol.37 , pp. 3292-3301
    • Chen, W.-J.1    Chang, C.-C.2    Le, T.H.N.3
  • 12
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • C. Fornell, and D.F. Larcker Evaluating structural equation models with unobservable variables and measurement error Journal of Marketing Research 18 1981 39 50
    • (1981) Journal of Marketing Research , vol.18 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 14
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory
    • P. Ifinedo Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory Computers & Security 31 2012 83 95
    • (2012) Computers & Security , vol.31 , pp. 83-95
    • Ifinedo, P.1
  • 19
    • 84879003430 scopus 로고    scopus 로고
    • RFID system: Design parameters and security issues
    • N. Meena, J. Ahmed, and U. Mujahid RFID system: Design parameters and security issues World Applied Sciences Journal 23 2 2013 236 244
    • (2013) World Applied Sciences Journal , vol.23 , Issue.2 , pp. 236-244
    • Meena, N.1    Ahmed, J.2    Mujahid, U.3
  • 21
    • 84866767555 scopus 로고    scopus 로고
    • A survey of password attacks and comparative analysis on methods for secure authentication
    • M. Raza, M. Iqbal, M. Sharif, and W. Haider A survey of password attacks and comparative analysis on methods for secure authentication World Applied Sciences Journal 19 4 2012 439 444
    • (2012) World Applied Sciences Journal , vol.19 , Issue.4 , pp. 439-444
    • Raza, M.1    Iqbal, M.2    Sharif, M.3    Haider, W.4
  • 22
    • 84892368745 scopus 로고    scopus 로고
    • Usability evaluation of touchless mouse based on infrared proximity sensing
    • Y.S. Ryu, D.H. Koh, D. Ryu, and D. Um Usability evaluation of touchless mouse based on infrared proximity sensing Journal of Usability Studies 7 1 2011 31 39
    • (2011) Journal of Usability Studies , vol.7 , Issue.1 , pp. 31-39
    • Ryu, Y.S.1    Koh, D.H.2    Ryu, D.3    Um, D.4
  • 29
    • 79960940984 scopus 로고    scopus 로고
    • Near field communication
    • R. Want Near field communication Pervasive Computing, IEEE 10 3 2011 4 7
    • (2011) Pervasive Computing, IEEE , vol.10 , Issue.3 , pp. 4-7
    • Want, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.