[图书][B] A design space for pervasive advertising on public displays

F Alt - 2013 - books.google.com
Today, people living in cities see up to 5000 ads per day, many on public displays. More and
more of these public displays are networked and equipped with sensors, making them part …

[PDF][PDF] Graphical password scheme using cued click point and persuasion with multiple images

A Sarim, R Jayesh, K Ishan, S Adil… - Int J Recent Innovation …, 2018 - academia.edu
There are three main categories of authentication system–token-based (what you have),
biometric-based (who you are) and knowledge-based (what you know). Cued Click Point is …

[PDF][PDF] On reviewing the limitations of graphical password scheme

S Suresh, G Prakash - Journal of Computer Science and …, 2015 - academia.edu
Authentication means it ensures that only individuals with verified identities can log on to the
system of access system resources. The most widespread authentication system used in all …

Can Jannie verify? Usability of display-equipped RFID tags for security purposes

A Kobsa, R Nithyanand, G Tsudik… - Journal of computer …, 2013 - content.iospress.com
The recent emergence of RFID tags capable of performing public key operations enables a
number of new applications in commerce (eg, RFID-enabled credit cards) and security (eg …

[图书][B] Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism

DK Ratakonda - 2022 - search.proquest.com
A variety of authentication mechanisms are used for online applications to protect user's
data. Prior literature identifies that adults and children often utilize weak authentication …

[PDF][PDF] A framework for the implementation of graphical passwords

JS Vorster - 2014 - researchgate.net
Graphical passwords have emerged over the past decade as a technology that may change
the way we authenticate to systems; it is a potential technology to replace typing passwords …

Tactile one-time pad: Leakage-resilient authentication for smartphones

S Uellenbeck, T Hupperich, C Wolf, T Holz - Financial Cryptography and …, 2015 - Springer
Nowadays, Smartphones are widely used and they have a growing market share of already
more than 55% according to recent studies. They often contain sensitive or private data that …

[PDF][PDF] GRAPHICAL PASSWORD SCHEMES DESIGN: ENHANCING MEMORABILITY FEATURES USING AUTOBIOGRAPHICAL MEMORIES.

O Adebola, N Ithnin, MZ Jali, N Akosu - Journal of Theoretical & …, 2013 - academia.edu
Memorability and security of passwords are two distinct extremes that are difficult to achieve
at the same time. These two important features are a major problem in conventional textual …

Discovering trends for the development of novel authentication applications for dementia patients

J Chaudhry, S Farmand, SMS Islam, MR Islam… - … on Applications and …, 2018 - Springer
We aim at creating ease in authentication process through non-password-based
authentication scheme for the Dementia patients. The chronic neuro-degenerative disease …

On screen randomized blank keyboard

NA Neenu - 2015 national conference on recent advances in …, 2015 - ieeexplore.ieee.org
Online banking has become increasingly popular globally because it is so easy and
convenient for internet users to manage their bank accounts from anywhere of the world at …