Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. However, there are problems associated with these picture-based password authentication systems such as: vulnerability to security threats, and users’ memorability of t...
محفوظ في:
المؤلف الرئيسي: | |
---|---|
التنسيق: | أطروحة |
منشور في: |
2012
|
الموضوعات: | |
الوصول للمادة أونلاين: | http://studentsrepo.um.edu.my/3533/4/Title_page%2C_abstract%2C_table_of_contents.pdf http://studentsrepo.um.edu.my/3533/5/Full_chapters.pdf http://studentsrepo.um.edu.my/3533/6/References.pdf http://studentsrepo.um.edu.my/3533/7/Appendices.pdf http://pendeta.um.edu.my/client/default/search/results?qu=Mitigation+of+shoulder-surfing+attack+on+picture-based+passwords+using+falsifying+authentication+methods&te= http://studentsrepo.um.edu.my/3533/ |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
الانترنت
http://studentsrepo.um.edu.my/3533/4/Title_page%2C_abstract%2C_table_of_contents.pdfhttp://studentsrepo.um.edu.my/3533/5/Full_chapters.pdf
http://studentsrepo.um.edu.my/3533/6/References.pdf
http://studentsrepo.um.edu.my/3533/7/Appendices.pdf
http://pendeta.um.edu.my/client/default/search/results?qu=Mitigation+of+shoulder-surfing+attack+on+picture-based+passwords+using+falsifying+authentication+methods&te=
http://studentsrepo.um.edu.my/3533/