Property Protection and User Authentication in IP Networks Through Challenge-Response Mechanisms: Present, Past, and Future Trends
暂无分享,去创建一个
[1] H. Gish,et al. Text-independent speaker identification , 1994, IEEE Signal Processing Magazine.
[2] Kejun Wang,et al. A study of hand vein recognition method , 2005, IEEE International Conference Mechatronics and Automation, 2005.
[3] Richard P. Ayers,et al. Picture Password: A Visual Login Technique for Mobile Devices , 2003 .
[4] B.S. Atal,et al. Automatic recognition of speakers from their voices , 1976, Proceedings of the IEEE.
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[7] Daniele D. Giusto,et al. Application-Scalable Image-based Authentication Framework with JPEG2000 , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.
[8] Do Van Thanh,et al. Strong authentication with mobile phone as security token , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[9] Ashok Samal,et al. Automatic recognition and analysis of human faces and facial expressions: a survey , 1992, Pattern Recognit..
[10] Darko Kirovski,et al. Multimedia Security Handbook , 2004 .
[11] David R. Mackay,et al. Graphical Authentication: Justifications and Objectives , 2004, AISM.
[12] E. Fatemizadeh,et al. Biometric Identification through Hand Geometry , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".
[13] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[14] Réjean Plamondon,et al. Automatic Signature Verification: The State of the Art - 1989-1993 , 1994, Int. J. Pattern Recognit. Artif. Intell..
[15] J.K. Omura. Novel applications of cryptography in digital communications , 1990, IEEE Communications Magazine.
[16] Daniele D. Giusto,et al. Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment , 2006, EURASIP J. Wirel. Commun. Netw..
[17] T. Tanaka,et al. Biometric authentication by hand vein patterns , 2004, SICE 2004 Annual Conference.
[18] Husrev T. Sencar,et al. Image Steganography: Concepts and Practice , 2004 .
[19] Hyeonjoon Moon,et al. The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[20] Jr. J.P. Campbell,et al. Speaker recognition: a tutorial , 1997, Proc. IEEE.
[21] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[22] Jean-Luc Dugelay,et al. A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..
[23] Sugata Sanyal,et al. CompChall: addressing password guessing attacks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[24] Chris J. Mitchell,et al. Limitations of challenge-response entity authentication , 1989 .
[25] Rachna Dhamija,et al. Hash visualization in user authentication , 2000, CHI Extended Abstracts.
[26] Ken Krechmer,et al. Standardization and Innovation Policies in the Information Age , 2004, Int. J. IT Stand. Stand. Res..
[27] Min-Shiang Hwang,et al. Security enhancement for Optimal Strong-Password Authentication protocol , 2003, OPSR.
[28] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[29] Azriel Rosenfeld,et al. Face recognition: A literature survey , 2003, CSUR.
[30] Ana González-Marcos,et al. Biometric Identification through Hand Geometry Measurements , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[32] M. Faundez-Zanuy. Biometric verification of humans by means of hand geometry , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.
[33] Patrick J. Flynn,et al. Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[34] James Ze Wang,et al. Exploiting the Human–Machine Gap in Image Recognition for Designing CAPTCHAs , 2009, IEEE Transactions on Information Forensics and Security.
[35] Xiaoqi Ma,et al. Verifying and Fixing Password Authentication Protocol , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).
[36] Hideki Koike,et al. Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images , 2003, Mobile HCI.
[37] Giaime Ginesu,et al. Transmission-Efficient Image-Based Authentication for Mobile Devices , 2005, VLBV.
[38] Alice J. O'Toole,et al. FRVT 2006 and ICE 2006 large-scale results , 2007 .
[39] M. Sandirigama,et al. SAS-3: A polynomial based strong password authentication protocol , 2007, 2007 International Conference on Industrial and Information Systems.
[40] Munish Sood,et al. Image Based Authentication System with Sign-In Seal * , 2008 .
[41] Chin-Chen Chang,et al. A secure and efficient strong-password authentication protocol , 2004, OPSR.
[42] Esharenana E. Adomi. Frameworks for ICT Policy: Government, Social and Legal Issues , 2010 .
[43] Richard M. Lindstrom. Limits for Qualitative Detection and Quantitative Determination in A Century of Excellence in Measurements, Standards, and Technology - A Chronicle of Selected NBS/NIST Publications, 1901-2000 | NIST , 2001 .
[44] Rama Chellappa,et al. Human and machine recognition of faces: a survey , 1995, Proc. IEEE.
[45] Sung-Hwan Jung,et al. A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).