Author:
Al Abdulwahid Abdulwahid,Clarke Nathan,Stengel Ingo,Furnell Steven,Reich Christoph
Funder
Royal Commission for Jubail and Yanbu (SA)
Saudi Arabian Cultural Bureau in London
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference150 articles.
1. Conrad, E., Misenar, S., Feldman, J.: Cissp Study Guide. Elsevier Inc., Burlington (2012)
2. Wood, H.M.: The use of passwords for controlling access to remote computer systems and services. In: Proceedings of the June 13–16, 1977, National Computer Conference (AFIPS ’77), pp. 27–33. ACM Press, New York, NY, USA (1977)
3. Zekri, L., Furnell, S.: Authentication based upon secret knowledge and its resilience to impostors. Adv. Netw. Commun. Eng. 3, 30–38 (2006)
4. O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE. 91, 2021–2040 (2003)
5. Kurkovsky, S., Syta, E.: Digital natives and mobile phones: a survey of practices and attitudes about privacy and security. In: 2010 IEEE International Symposium on Technology and Society, pp. 441–449. IEEE (2010)
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. User Verification Using Evoked EEG by Invisible Visual Stimulation;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2023-12-01
2. Biometrics for Continuous Authentication;Continuous Biometric Authentication Systems;2023-10-29
3. Continuous Authentication;Continuous Biometric Authentication Systems;2023-10-29
4. Traditional Authentication;Continuous Biometric Authentication Systems;2023-10-29
5. A Study of Multimodal Colearning, Application in Biometrics and Authentication;Multimodal Biometric and Machine Learning Technologies;2023-10-16