-
4
-
-
60649087532
-
Yagp: Yet another graphical password strategy
-
0
-
H. Gao, X. Guo, X. Chen, L. Wang, and X. Liu. Yagp: Yet another graphical password strategy. Computer Security Applications Conference, Annual, 0:121-129, 2008.
-
(2008)
Computer Security Applications Conference, Annual
, pp. 121-129
-
-
Gao, H.1
Guo, X.2
Chen, X.3
Wang, L.4
Liu, X.5
-
5
-
-
58049154025
-
-
pages SPIE
-
S. Gutta, J. R. Huang, H. Wechsler, and B. Takacs. Automated face recognition. volume 2938, pages 20-30. SPIE, 1997.
-
(1997)
Automated face recognition
, vol.2938
, pp. 20-30
-
-
Gutta, S.1
Huang, J. R.2
Wechsler, H.3
Takacs, B.4
-
6
-
-
0030735959
-
An introduction to multisensory data fusion
-
January
-
D. L. Hall and J. Llinas. An introduction to multisensory data fusion. Proc. IEEE, 85(1), January 1997.
-
(1997)
Proc. IEEE
, vol.85
, Issue.1
-
-
Hall, D. L.1
Llinas, J.2
-
8
-
-
0002897112
-
Optical character recognition - a survey
-
S. Impedovo, L. Ottaviano, and S. Occhinegro. Optical character recognition - a survey. International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), 5(1-2):1-24, 1991.
-
(1991)
International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI)
, vol.5
, Issue.1-2
, pp. 1-24
-
-
Impedovo, S.1
Ottaviano, L.2
Occhinegro, S.3
-
9
-
-
38549083617
-
100% accuracy in automatic face recognition
-
January
-
R. Jenkins and A. Burton. 100% accuracy in automatic face recognition. Science, 319(5862):435, January 2008.
-
(2008)
Science
, vol.319
, Issue.5862
, pp. 435
-
-
Jenkins, R.1
Burton, A.2
-
10
-
-
85084161999
-
The design and analysis of graphical passwords
-
Berkeley, CA, USA, USENIX Association
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In USENIX Sec'99, pages 1-1, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
USENIX Sec'99
, pp. 1-1
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M. K.4
Rubin, A. D.5
-
11
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
D. V. Klein. Foiling the cracker: A survey of, and improvements to, password security. In USENIX Sec'90, 1990.
-
(1990)
USENIX Sec'90
-
-
Klein, D. V.1
-
12
-
-
70349278617
-
Reconsidering physical key secrecy: Teleduplication via optical decoding
-
October
-
B. Laxton, K. Wang, and S. Savage. Reconsidering physical key secrecy: Teleduplication via optical decoding. In CCS, October 2008.
-
(2008)
CCS
-
-
Laxton, B.1
Wang, K.2
Savage, S.3
-
13
-
-
0022895822
-
An overview of character recognition methodologies
-
J. Mantas. An overview of character recognition methodologies. Pattern Recognition, 19(6):425-430, 1986.
-
(1986)
Pattern Recognition
, vol.19
, Issue.6
, pp. 425-430
-
-
Mantas, J.1
-
14
-
-
0004250152
-
-
John Wiley & Sons, Inc., New York, NY, USA
-
S. Mori, H. Nishida, and H. Yamada. Optical Character Recognition. John Wiley & Sons, Inc., New York, NY, USA, 1999.
-
(1999)
Optical Character Recognition
-
-
Mori, S.1
Nishida, H.2
Yamada, H.3
-
16
-
-
71149087269
-
Visual passwords: Cure-all or snake-oil
-
December
-
K. Renaud and A. D. Angeli. Visual passwords: Cure-all or snake-oil. Communications of the ACM, 52(12):135-140, December 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.12
, pp. 135-140
-
-
Renaud, K.1
Angeli, A. D.2
-
17
-
-
85084163855
-
Graphical dictionaries and the memorable sapce of graphical passwords
-
August
-
J. Thorpe and P. van Oorschot. Graphical dictionaries and the memorable sapce of graphical passwords. In USENIX Sec'04, August 2004.
-
(2004)
USENIX Sec'04
-
-
Thorpe, J.1
van Oorschot, P.2
-
18
-
-
85049042638
-
Human-seeded attacks and exploiting hot-spots in graphical passwords
-
J. Thorpe and P. C. van Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In USENIX Sec'07, 2007.
-
(2007)
USENIX Sec'07
-
-
Thorpe, J.1
van Oorschot, P. C.2
|