Author:
Kamegne Yvonne,Owusu Eric,Chakraborty Joyram
Publisher
Springer International Publishing
Reference12 articles.
1. Maayan, G.: 5 Authentication Methods that Can Prevent the Next Breach (2019). https://www.idrnd.ai/5-authentication-methods-that-can-prevent-the-next-breach/
2. Weldon, M.S., Roediger, H.L., Challis, B.H.: The properties of retrieval cues constrain the picture superiority effect. Mem. Cognit. 17(1), 95–105 (1989). https://doi.org/10.3758/BF03199561
3. Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: effects of tolerance and image choice. In: Proceedings of the 2005 symposium on Usable privacy and security, pp. 1–12, July 2005
4. Aljahdali, H.M., Poet, R.: Users’ perceptions of recognition-based graphical passwords: a qualitative study on culturally familiar graphical passwords. In: Proceedings of the 7th International Conference on Security of Information and Networks, pp. 279–283, September 2014
5. Czaja, S.J., Boot, W.R., Charness, N., Rogers, W.A.: Designing for Older Adults: Principles and Creative Human Factors Approaches, 3rd edn. CRC Press, Boca Raton, FL (2019)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献