Author:
Patel Shikhar Singh,Jaiswal Akarsh,Arora Yash,Sharma Bharti
Reference11 articles.
1. Mayer IJA, Monrose F, Rubin MKRAD (1999) March. The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX security symposium
2. Syukri AF, Okamoto E, Mambo M (1998) A user identification system using signature written with mouse. In: Australasian conference on information security and privacy. Springer, Berlin, Heidelberg, pp 403–414
3. Wiedenbeck S, Waters J, Birget JC, Brodskiy A, Memon N (2005) PassPoints: design and longitudinal evaluation of a graphical password system. Int J Hum Comput Stud 63(1–2):102–127
4. R. U. Corporation (2005) How the passface system works
5. Blonder G (1996) Graphical passwords. United States Paten 5559961, Lucent Technologies. Inc., Murray Hill
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献