Author:
Wu Tzong-Sun,Lee Ming-Lun,Lin Han-Yu,Wang Chao-Yuan
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference33 articles.
1. Abdullah, M.D.H.B., Abdullah, A.H.B., Ithnin, N., Mammi, H.K.: Graphical password: user’s affinity of choice-an analysis of picture attributes selection. In: International Symposium on Information Technology vol. 3, pp. 1–6 (2008)
2. Alsulaiman, F.A., Saddik, A.E.: A novel 3D graphical password schema. In; Proceedings of the IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems, pp. 125–128 (2006)
3. Boit, A., Geimer, T., Loviscach, J.A.: random cursor matrix to hide graphical password input. In: International Conference on Computer Graphics and Interactive Techniques, pp. 1–1 (2009)
4. Boyd, S.W., Keromytis, A.D.: SQLrand: Preventing SQL injection attacks. In: International Conference on Applied Cryptography and Network Security, pp. 292–302 (2004)
5. Chiasson, S., Forget, A., Biddle, R.: Accessibility and graphical passwords. In: Symposium on Accessible Privacy and Security, Pittsburgh, USA (2008)
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献