Image Authentication Schemes against Key-Logger Spyware
-
Published:2008
Issue:
Volume:
Page:
-
ISSN:
-
Container-title:2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
-
language:
-
Short-container-title:
Author:
Doja M.N.,Kumar Naveen
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Types of Keyloggers Technologies – Survey;Lecture Notes in Electrical Engineering;2020-10-12
2. Hypervisor injection attack using X-cross API calls (HI-API attack);Journal of Ambient Intelligence and Humanized Computing;2020-03-02
3. Alternative Authentication in the Wild;2015 Workshop on Socio-Technical Aspects in Security and Trust;2015-07
4. Internet Usage Monitoring for Crime Detection;Communications in Computer and Information Science;2010