Author:
Safdar Sohail,Hassan Mohd Fadzil
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Safdar, S., Hassan, M.F., Qureshi, M.A., Akbar, R.: Framework for Alternate Execution of workflows under threat. In: 2nd International Conference on Communication Software and Networks ICCSN, Singapore (2010)
2. Safdar, S., Hassan, M.F.: Moving Towards Two Dimensional Passwords. In: International Symposium on Information Technology ITSIM, Malaysia (2010)
3. SOPHOS: a to z of Computer Secutity Threats SOPHOS (2006) , http://security.ucdavis.edu/sophos_atoz.pdf (retrieved on January 17, 2011)
4. Yang, D., Yang, B.: A New Password Authentication Scheme Using Fuzzy Extractor with Smart Card. In: 2009 International Conference on Computational Intelligence and Security, pp. 278–282 (2009)
5. Oorschot, P.C.V., Thorpe, J.: On Predictive Models and User-Drawn Graphical Passwords. ACM Transactions on Information and System Security 10(4), article 17 (2008)