Author:
Clarke Dwaine,Gassend Blaise,Kotwal Thomas,Burnside Matt,van Dijk Marten,Devadas Srinivas,Rivest Ronald
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Martin Abadi, Michael Burrows, C. Kaufman, and Butler W. Lampson. Authentication and delegation with smart-cards. In Theoretical Aspects of Computer Software, pages 326–345, 1991.
2. M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas, and R. Rivest. Proxy-based security protocols in networked mobile devices. In Proceedings SAC, 2002.
3. Rachna Dhamija and Adrian Perrig. Dejà vu: A user study using images for authentication. In Proceedings of the 9th USENIX Security Symposium, 2000.
4. Nicholas J. Hopper and Manuel Blum. A secure human-computer authentication scheme.
5. Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security, Private Communication in a Public World. Prentice Hall PTR, 1995.
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献