A Location-Based Authentication System Leveraging Smartphones
暂无分享,去创建一个
Nhan Nguyen | Athanasios Bamis | Mohammad Maifi Hasan Khan | Sotiris Kentros | Yusuf Albayram | Ruhua Jiang
[1] Richard C. H. Connor,et al. Question-based authentication using context data , 2006, NordiCHI '06.
[2] Jason I. Hong,et al. Exploring capturable everyday memory for autobiographical authentication , 2013, UbiComp.
[3] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[4] Wendy Moncur,et al. Pictures at the ATM: exploring the usability of multiple graphical passwords , 2007, CHI.
[5] Sotirios Terzis,et al. A Study in Authentication Via Electronic Personal History Questions , 2010, ICEIS.
[6] Gary W. Heiman,et al. Basic statistics for the behavioral sciences , 2002 .
[7] Mike Just,et al. Designing and evaluating challenge-question systems , 2004, IEEE Security & Privacy Magazine.
[8] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[9] Mike Just,et al. Personal choice and challenge questions: a security and usability assessment , 2009, SOUPS.
[10] Robert Biddle,et al. A second look at the usability of click-based graphical passwords , 2007, SOUPS '07.
[11] A. Ant Ozok,et al. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.
[12] Mark D. Dunlop,et al. Internet authentication based on personal history - a feasibility test , 2005 .
[13] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[14] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[15] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[16] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..