Advantages of User Authentication Using Unclear Images Automatic Generation of Decoy Images
暂无分享,去创建一个
[1] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[2] Dawn Song,et al. Hash Visualization: a New Technique to improve Real-World Security , 1999 .
[3] Tadanori Mizuno,et al. A User Authentication System Using Schema of Visual Memory , 2006, BioADIT.
[4] W. Brewer,et al. Role of schemata in memory for places , 1981, Cognitive Psychology.
[5] Hideki Koike,et al. Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images , 2003, Mobile HCI.
[6] Takumi Yamamoto,et al. Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue , 2007, Security and Management.