An Efficient Security Key for Practical Requirement of PIN Entry Protection Section Authentication
暂无分享,去创建一个
[1] G. A. Miller. THE PSYCHOLOGICAL REVIEW THE MAGICAL NUMBER SEVEN, PLUS OR MINUS TWO: SOME LIMITS ON OUR CAPACITY FOR PROCESSING INFORMATION 1 , 1956 .
[2] Robert H. Deng,et al. Designing leakage-resilient password entry on touchscreen mobile devices , 2013, ASIA CCS '13.
[3] Taekyoung Kwon,et al. Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[4] Daphna Weinshall,et al. Cognitive authentication schemes safe against spyware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[5] Patrick Olivier,et al. Multi-touch authentication on tabletops , 2010, CHI.
[6] Andrea Prati,et al. Integrating Consumer Smart Cameras into Camera Networks: Opportunities and Obstacles , 2014, Computer.
[7] Hideki Imai,et al. Human Identification Through Insecure Channel , 1991, EUROCRYPT.
[8] Ian Oakley,et al. The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices , 2011, Tangible and Embedded Interaction.
[9] Ted Taekyoung Kwon,et al. SwitchPIN: Securing smartphone PIN entry with switchable keypads , 2014, 2014 IEEE International Conference on Consumer Electronics (ICCE).
[10] Ian Oakley,et al. Spinlock: A Single-Cue Haptic and Audio PIN Input Technique for Authentication , 2011, HAID.
[11] Heinrich Hußmann,et al. Towards understanding ATM security: a field study of real world ATM use , 2010, SOUPS.
[12] Robert H. Deng,et al. On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability , 2012, NDSS.
[13] Shujun Li,et al. Breaking undercover: exploiting design flaws and nonuniform human behavior , 2011, SOUPS.
[14] Volker Roth,et al. A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.
[15] Jin Hong,et al. Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks , 2015, IEEE Transactions on Information Forensics and Security.
[16] Shujun Li,et al. Cryptanalysis of the convex hull click human identification protocol , 2010, International Journal of Information Security.
[17] Susan Wiedenbeck,et al. Design and evaluation of a shoulder-surfing resistant graphical password scheme , 2006, AVI '06.
[18] Ted Taekyoung Kwon,et al. SteganoPIN: Two-Faced Human–Machine Interface for Practical Enforcement of PIN Entry Security , 2016, IEEE Transactions on Human-Machine Systems.
[19] Ian Oakley,et al. Counting clicks and beeps: Exploring numerosity based haptic and audio PIN entry , 2012, Interact. Comput..
[20] Nicolas Christin,et al. Undercover: authentication usable in front of prying eyes , 2008, CHI.
[21] Amit K. Roy-Chowdhury,et al. Distributed Camera Networks , 2011, IEEE Signal Processing Magazine.
[22] Johnny Long,et al. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing , 2008 .
[23] David A. Wagner,et al. Cryptanalysis of a Cognitive Authentication Scheme , 2006, IACR Cryptol. ePrint Arch..
[24] N. Cowan. The magical number 4 in short-term memory: A reconsideration of mental storage capacity , 2001, Behavioral and Brain Sciences.
[25] Heinrich Hußmann,et al. Vibrapass: secure authentication based on shared lies , 2009, CHI.