A review of graphical authentication utilising a keypad input method
暂无分享,去创建一个
Maria Papadaki | Steven Furnell | Paul Dowland | Hussain Alsaiari | S. Furnell | P. Dowland | M. Papadaki | H. Alsaiari
[1] Suryakanth V. Gangashetty,et al. Passblot: A Highly Scalable Graphical One Time Password System , 2012 .
[2] Partha Pratim Ray,et al. Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices , 2012 .
[3] James Miller,et al. Token-based graphical password authentication , 2011, International Journal of Information Security.
[4] Suryakanth V. Gangashetty,et al. Passblot: A Usable Way of Authentication Scheme to Generate One Time Passwords , 2011 .
[5] Shashi Mogalla,et al. A Well Known Tool Based Graphical Authentication Technique , 2011 .
[6] M. Angela Sasse,et al. Evaluating the usability and security of a graphical one-time PIN system , 2010, BCS HCI.
[7] Ravi Kuber,et al. Feasibility study of tactile-based authentication , 2010, Int. J. Hum. Comput. Stud..
[8] Haichang Gao,et al. A new graphical password scheme against spyware by using CAPTCHA , 2009, SOUPS.
[9] Issues Threats and Future Trend for Gsp. Issues, Threats and Future Trend for GSP , 2008 .
[10] Carol Alexander. Two factor authentication that doesn’t use chips , 2008 .
[11] Mukesh Singhal,et al. Password-Based Authentication: Preventing Dictionary Attacks , 2007, Computer.
[12] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[13] Antonella De Angeli,et al. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems , 2005, Int. J. Hum. Comput. Stud..
[14] Dawei Hong,et al. A Graphical Password Scheme Strongly Resistant to Spyware , 2004, Security and Management.
[15] Dawei Hong,et al. A Shoulder-Surfing Resistant Graphical Password Scheme - WIW , 2003, Security and Management.
[16] Benny Pinkas,et al. Securing passwords against dictionary attacks , 2002, CCS '02.
[17] Nick Feamster,et al. Dos and don'ts of client authentication on the web , 2001 .
[18] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[19] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[20] R. Haber,et al. Perception and memory for pictures: Single-trial learning of 2500 visual stimuli , 1970 .