incidence of
暂无分享,去创建一个
[1] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[2] W. Jansen,et al. Authenticating Mobile Device UsersThrough Image Selection , 2004 .
[3] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[4] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[5] Manuel Blum,et al. A Secure Human-Computer Authentication Scheme , 2000 .
[6] Julie Thorpe,et al. Graphical Dictionaries and the Memorable Space of Graphical Passwords , 2004, USENIX Security Symposium.
[7] Stewart Tseng,et al. COMPARISON OF HOLISTIC AND FEATURE BASED APPROACHES TO FACE RECOGNITION , 2003 .