Author:
Liu Xi-Yang,Gao Hai-Chang,Wang Li-Ming,Chang Xiu-Ling
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference20 articles.
1. Adams A, Sasse M A. Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM, 1999, 42(12): 41–46.
2. Zhang Y D, Tang S, Li J T. Secure and incidental distortion tolerant digital signature for image authentication. Journal of Computer Science and Technology, 2007, 22(4): 618–625.
3. Paivio A, Rogers T B, Smythe P C. Why are pictures easier to recall than words? Psychonomic Science, 1968, 11(4): 137–138.
4. Zhang H B, Yang C, Quan X M. Image authentication based on digital signature and semi-fragile watermarking. Journal of Computer Science and Technology, 2004, 19(6): 752–759.
5. Jermyn I, Mayer A, Monrose F, Reiter M K, Rubin A D. The design and analysis of graphical passwords. In Proc. the 8th USENIX Security Symposium, Washington, USA, August 23–26, 1999, pp.1-15.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Graphical Password Authentication using Image Processing (GPAIP);2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
2. Preference-Oriented Password-Based Authentication;Information and Communication Technology for Competitive Strategies (ICTCS 2020);2021-07-27
3. My Personal Images as My Graphical Password;IEEE Latin America Transactions;2018-05
4. RSVP a temporal method for graphical authentication;Journal of Information Privacy and Security;2017-11-21
5. Graphical Authentication Resistance to Over-the-Shoulder-Attacks;Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems;2017-05-06