A Study of Implementation of Image Based Authentication System
暂无分享,去创建一个
[1] Andrew S. Patrick,et al. HCI and security systems , 2003, CHI Extended Abstracts.
[2] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[3] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[4] Patrick Olivier,et al. Securing passfaces for description , 2008, SOUPS '08.
[5] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[6] W. Jansen,et al. Authenticating Mobile Device UsersThrough Image Selection , 2004 .
[7] Daphna Weinshall,et al. Passwords you'll never forget, but can't recall , 2004, CHI EA '04.
[8] Vibha Sazawal,et al. Doodling our way to better authentication , 2002, CHI Extended Abstracts.
[9] Julie Thorpe,et al. Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.
[10] Eiji Okamoto,et al. A User Identification System Using Signature Written with Mouse , 1998, ACISP.
[11] Richard P. Ayers,et al. Picture Password: A Visual Login Technique for Mobile Devices , 2003 .
[12] Julie Thorpe,et al. Graphical Dictionaries and the Memorable Space of Graphical Passwords , 2004, USENIX Security Symposium.
[13] Wayne Jansen,et al. Authenticating Mobile Device Users Through Image Selection | NIST , 2004 .
[14] Hideki Koike,et al. Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images , 2003, Mobile HCI.
[15] Antonella De Angeli,et al. VIP: a visual approach to user authentication , 2002, AVI '02.