Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference39 articles.
1. Yang, J.-H., Chang, Y.-F., & Chen, Y.-H. (2013). An efficient authenticated encryption scheme based on ECC and its application for electronic payment. Information Technology and Control, 42(4), 315–324.
2. Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2015). A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research, 16(1), 113–139.
3. Saxena, N., & Watt, J. H. (2009). Authentication technologies for the blind or visually imparied. In Proceedings of the 4th USENIX conference on hot topics in security.
4. Buxton, W., Foulds, R., Rosen, M., Scadden, L., & Shein, F. (1986). Human interface design and the handicapped user. SI GCHI Bulletin, 17(4), 291–297.
5. Kane, S. K., Morris, M. R., & Wobbrock, J. O. (2013). Touchplates: Low-cost tactile overlays for visually impaired touch screen users. In Proceedings of the 15th international ACM SIGACCESS conference on computers and accessibility (22 pp.).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献