Notice of Violation of IEEE Publication PrinciplesAuthentication using graphical password to upgrade security & memorability
暂无分享,去创建一个
[1] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[2] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[3] Heikki Hyyrö,et al. A Bit-Vector Algorithm for Computing Levenshtein and Damerau Edit Distances , 2003, Nord. J. Comput..
[4] Eiji Okamoto,et al. A User Identification System Using Signature Written with Mouse , 1998, ACISP.
[5] Martina Angela Sasse,et al. Why users compromise computer security mechanisms and how to take remedial measures. , 1999 .
[6] Patrick Olivier,et al. Graphical passwords & qualitative spatial relations , 2007, SOUPS '07.
[7] J. Kase. Graphical Passwords , 2008 .
[8] L.D. Paulson. Taking a graphical approach to the password , 2002, Computer.