Comparison of Graphical Password Authentication Techniques
暂无分享,去创建一个
Poonam M Bhogle | Arti Bhanushali | Bhavika Mange | Harshika Vyas | Hetal Bhanushali | Arti S. Bhanushali | Bhavika Mange | Harshika Vyas | Hetal Bhanushali
[1] Ian Welch,et al. A hybrid recognition and recall based approach in graphical passwords , 2012, OZCHI.
[2] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[3] Habibi Lashkari Arash. A new algorithm for graphical user authentication based on rotation and resizing , 2010 .
[4] Patrick Olivier,et al. Graphical passwords & qualitative spatial relations , 2007, SOUPS '07.
[5] Julie Thorpe,et al. Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.
[6] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[7] Mohammad Sarosh Umar,et al. Graphical user authentication: A time interval based approach , 2012, 2012 IEEE International Conference on Signal Processing, Computing and Control.
[8] Rachna Dhamija,et al. Hash visualization in user authentication , 2000, CHI Extended Abstracts.
[9] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[10] Abdul Hanan Abdullah,et al. Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique , 2008, 2008 Second Asia International Conference on Modelling & Simulation (AMS).
[11] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.