Graphical Semantic Authentication
暂无分享,去创建一个
[1] Lior Rokach,et al. Introduction to Information Security , 2012 .
[2] Panagiotis Germanakos,et al. The interplay between humans, technology and user authentication: A cognitive processing perspective , 2017, Comput. Hum. Behav..
[3] Eugenijus Kurilovas,et al. Creation of Web 2.0 tools ontology to improve learning , 2015, Comput. Hum. Behav..
[4] Pascal Salembier,et al. Experimental studies of a graphical authentication system based on semantic categorisation , 2016, IHM.
[5] Jean-Louis Lanet,et al. Theoretical Security Evaluation of the Human Semantic Authentication Protocol , 2018, ICETE.
[6] Frank Stajano,et al. Passwords and the evolution of imperfect authentication , 2015, Commun. ACM.
[7] Peter Mikulecký,et al. Infrastructure Authentication, Authorization and Accounting Solutions for an OpenStack Platform , 2019, MobiWIS.
[8] Daniel Pacheco Lacerda,et al. Design Science Research: A Method for Science and Technology Advancement , 2014 .
[9] Michael S. Bernstein,et al. Visual Genome: Connecting Language and Vision Using Crowdsourced Dense Image Annotations , 2016, International Journal of Computer Vision.
[10] Lujo Bauer,et al. “It's not actually that horrible”: Exploring Adoption of Two-Factor Authentication at a University , 2018, CHI.
[11] Dan J. Kim,et al. Exploring Determinants of Semantic Web Technology Adoption from IT Professionals' Perspective: Industry Competition, Organization Innovativeness, and Data Management Capability , 2018, Comput. Hum. Behav..
[12] Ahmad Almulhem. A graphical password authentication system , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).
[13] Aleksandr Ometov,et al. Multi-Factor Authentication: A Survey , 2018, Cryptogr..
[14] William C. Barker. Guideline for Identifying an Information System as a National Security System , 2003 .
[15] Wei Cao,et al. Network security assessment using a semantic reasoning and graph based approach , 2017, Comput. Electr. Eng..
[16] Hao Jiang,et al. Authentication by Encrypted Negative Password , 2019, IEEE Transactions on Information Forensics and Security.
[17] Jian Ren,et al. PassBio: Privacy-Preserving User-Centric Biometric Authentication , 2017, IEEE Transactions on Information Forensics and Security.
[18] Joy M. Perrin. A Practical Perspective on Preparation for the Semantic Web , 2017 .
[19] Krzysztof Joachimiak,et al. Model for adaptable context-based biometric authentication for mobile devices , 2016, Personal and Ubiquitous Computing.
[20] Ellis E. Eghan,et al. Tracing known security vulnerabilities in software repositories - A Semantic Web enabled modeling approach , 2016, Sci. Comput. Program..