Security Optimization for Distributed Applications Oriented on Very Large Data Sets
暂无分享,去创建一个
[1] Heinrich Hußmann,et al. Look into my Eyes! Can you guess my Password? , 2009 .
[2] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[3] Anil Kumar,et al. Overview of Information Security Using Genetic Algorithm and Chaos , 2009, Inf. Secur. J. A Glob. Perspect..
[4] Steven Skiena,et al. Improving Usability Through Password-Corrective Hashing , 2006, SPIRE.
[5] Michael Lees,et al. Data access in distributed simulations of multi-agent systems , 2008, J. Syst. Softw..
[6] Steven Furnell,et al. An assessment of website password practices , 2007, Comput. Secur..
[7] Bingsheng He,et al. Bayesian Networks for Knowledge-Based Authentication , 2007 .
[8] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[9] Joshua Cook,et al. Improving password security and memorability to protect personal and organizational information , 2007, Int. J. Hum. Comput. Stud..
[10] Divakaran Liginlal,et al. A maximum entropy approach to feature selection in knowledge-based authentication , 2008, Decis. Support Syst..
[11] Andrew Beng Jin Teoh,et al. A secure digital camera based fingerprint verification system , 2010, J. Vis. Commun. Image Represent..
[12] Ion Ivan,et al. Stable Structures for Distributed Applications , 2008 .
[13] Dov Dori,et al. A Software System Development Life Cycle Model for Improved Stakeholders' Communication and Collaboration , 2010, Int. J. Comput. Commun. Control.
[14] Curtis E. Dyreson,et al. Building test cases and oracles to automate the testing of web database applications , 2009, Inf. Softw. Technol..
[15] Zhi-Qiang Liu,et al. Region-Level Image Authentication Using Bayesian Structural Content Abstraction , 2008, IEEE Transactions on Image Processing.
[16] Jeff Yan,et al. Is FacePIN secure and usable? , 2007, SOUPS '07.
[17] P. Ostojic,et al. Memorability of Alternative Password Systems , 2009, Int. J. Pattern Recognit. Artif. Intell..