共 50 条
- [21] Are Graphical Authentication Mechanisms As Strong As Passwords? [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 837 - 844
- [22] Multiple password interference in graphical passwords [J]. Int. J. Inf. Comput. Secur., 2012, 1 (11-27):
- [24] Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 973 - 982
- [26] Authentication by Graphical Passwords Method 'Hope' [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 94 - 99
- [27] Balancing Usability and Security of Graphical Passwords [J]. DIGITAL INTERACTION AND MACHINE INTELLIGENCE, MIDI 2021, 2022, 440 : 153 - 160
- [28] The Pattern-richness of Graphical Passwords [J]. 2016 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE 2016 ISSA CONFERENCE, 2016, : 69 - 76
- [30] Secure Human Authentication with Graphical Passwords [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1247 - 1259