Graphical User Authentication in Mobile Device using the web RGB color palette
暂无分享,去创建一个
[1] Michael K. Reiter,et al. On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.
[2] Eiji Okamoto,et al. A User Identification System Using Signature Written with Mouse , 1998, ACISP.
[3] Dennis J. Delprato,et al. Mind and Its Evolution: A Dual Coding Theoretical Approach , 2009 .
[4] Dawei Hong,et al. A Shoulder-Surfing Resistant Graphical Password Scheme - WIW , 2003, Security and Management.
[5] Ali Mohamed Eljetlawi,et al. Graphical password: Usable graphical password prototype , 2009 .
[6] Susan Wiedenbeck,et al. Design and evaluation of a shoulder-surfing resistant graphical password scheme , 2006, AVI '06.
[7] Richard P. Ayers,et al. Picture Password: A Visual Login Technique for Mobile Devices , 2003 .
[8] Arash Habibi Lashkari,et al. A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns , 2010, ArXiv.
[9] Paul C. van Oorschot,et al. Passwords: If We're So Smart, Why Are We Still Using Them? , 2009, Financial Cryptography.
[10] Susan Wiedenbeck,et al. Authentication Using Graphical Passwords: Basic Results , 2005 .
[11] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[12] Vibha Sazawal,et al. Doodling our way to better authentication , 2002, CHI Extended Abstracts.
[13] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[14] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[15] Li-Tung Weng,et al. Graphical Passwords Using Images with Random Tracks of Geometric Shapes , 2008, 2008 Congress on Image and Signal Processing.
[16] J. Kase. Graphical Passwords , 2008 .
[17] Hideki Koike,et al. Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images , 2003, Mobile HCI.
[18] Maslin Masrom,et al. A Survey on Recognition Based Graphical User Authentication Algorithms , 2009, ArXiv.
[19] Julie Thorpe,et al. Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.
[20] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..