Secure authentication for data protection in cloud computing using color schemes
暂无分享,去创建一个
[1] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[2] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[3] Dawei Hong,et al. A Shoulder-Surfing Resistant Graphical Password Scheme - WIW , 2003, Security and Management.
[4] Julie Thorpe,et al. Graphical Dictionaries and the Memorable Space of Graphical Passwords , 2004, USENIX Security Symposium.
[5] M. Angela Sasse,et al. Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.
[6] Rachna Dhamija,et al. Hash visualization in user authentication , 2000, CHI Extended Abstracts.
[7] Susan Wiedenbeck,et al. Design and evaluation of a shoulder-surfing resistant graphical password scheme , 2006, AVI '06.
[8] Antonella De Angeli,et al. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems , 2005, Int. J. Hum. Comput. Stud..
[9] M Sreelatha,et al. Authentication Schemes for Session Passwords using Color and Images , 2011 .
[10] S. Balaji,et al. Authentication techniques for engendering session passwords with colors and text , 2012, CSA 2012.
[11] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..