메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Smudge attacks on smartphone touch screens

Author keywords

[No Author keywords available]

Indexed keywords

ANDROID (OPERATING SYSTEM); AUTHENTICATION; PERSONAL COMPUTERS; PERSONAL COMPUTING; SMARTPHONES; USER INTERFACES;

EID: 84961346783     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (600)

References (19)
  • 6
    • 0030735959 scopus 로고    scopus 로고
    • An introduction to multisensory data fusion
    • January
    • D. L. Hall and J. Llinas. An introduction to multisensory data fusion. Proc. IEEE, 85(1), January 1997.
    • (1997) Proc. IEEE , vol.85 , Issue.1
    • Hall, D. L.1    Llinas, J.2
  • 9
    • 38549083617 scopus 로고    scopus 로고
    • 100% accuracy in automatic face recognition
    • January
    • R. Jenkins and A. Burton. 100% accuracy in automatic face recognition. Science, 319(5862):435, January 2008.
    • (2008) Science , vol.319 , Issue.5862 , pp. 435
    • Jenkins, R.1    Burton, A.2
  • 10
    • 85084161999 scopus 로고    scopus 로고
    • The design and analysis of graphical passwords
    • Berkeley, CA, USA, USENIX Association
    • I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In USENIX Sec'99, pages 1-1, Berkeley, CA, USA, 1999. USENIX Association.
    • (1999) USENIX Sec'99 , pp. 1-1
    • Jermyn, I.1    Mayer, A.2    Monrose, F.3    Reiter, M. K.4    Rubin, A. D.5
  • 11
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • D. V. Klein. Foiling the cracker: A survey of, and improvements to, password security. In USENIX Sec'90, 1990.
    • (1990) USENIX Sec'90
    • Klein, D. V.1
  • 12
    • 70349278617 scopus 로고    scopus 로고
    • Reconsidering physical key secrecy: Teleduplication via optical decoding
    • October
    • B. Laxton, K. Wang, and S. Savage. Reconsidering physical key secrecy: Teleduplication via optical decoding. In CCS, October 2008.
    • (2008) CCS
    • Laxton, B.1    Wang, K.2    Savage, S.3
  • 13
    • 0022895822 scopus 로고
    • An overview of character recognition methodologies
    • J. Mantas. An overview of character recognition methodologies. Pattern Recognition, 19(6):425-430, 1986.
    • (1986) Pattern Recognition , vol.19 , Issue.6 , pp. 425-430
    • Mantas, J.1
  • 15
  • 16
    • 71149087269 scopus 로고    scopus 로고
    • Visual passwords: Cure-all or snake-oil
    • December
    • K. Renaud and A. D. Angeli. Visual passwords: Cure-all or snake-oil. Communications of the ACM, 52(12):135-140, December 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.12 , pp. 135-140
    • Renaud, K.1    Angeli, A. D.2
  • 17
    • 85084163855 scopus 로고    scopus 로고
    • Graphical dictionaries and the memorable sapce of graphical passwords
    • August
    • J. Thorpe and P. van Oorschot. Graphical dictionaries and the memorable sapce of graphical passwords. In USENIX Sec'04, August 2004.
    • (2004) USENIX Sec'04
    • Thorpe, J.1    van Oorschot, P.2
  • 18
    • 85049042638 scopus 로고    scopus 로고
    • Human-seeded attacks and exploiting hot-spots in graphical passwords
    • J. Thorpe and P. C. van Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In USENIX Sec'07, 2007.
    • (2007) USENIX Sec'07
    • Thorpe, J.1    van Oorschot, P. C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.