과제정보
연구 과제 주관 기관 : 인하대학교
참고문헌
- S. Wiedenbeck, J. Waters, L. Sobrado, and J. Birget, "Design and evaluation of a shoulder- surfing resistant graphical password scheme," Proceedings of the Advanced Visual Interfaces, pp. 177-184, May 2006.
- H. Zhao and X. Li, "S3PAS: a scalable shoulder-surfing resistant textual-graphical password authentication scheme," Proceedings of the 21st IEEE International Conference on Advanced Information Networking and Applications Workshops, vol. 2, pp. 467-472, May 2007.
- D. Weinshall, "Cognitive authentication schemes safe against spyware," Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 1-16, May 2006.
- P. Golle and D. Wagner, "Cryptanalysis of a cognitive authentication schme," Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 66-70, May 2007.
- H. Jameel, R.A. Shaikh, H. Lee, and S. Lee, "Human identification through image evaluation using secret predicates," Proceedings of the Cryptographer's Track at RSA Conference, LNCS 4377, pp. 67-84, 2007.
- X. Suo, Y. Zhu, and G.S. Owen, "Graphical passwords: a survey," Proceedings of the 21st Annual Computer Security Applications Conference, pp. 463-472, Dec. 2005.
- E.K. Vogel and M.G. Machizawa, "Neural activity predicts individual differences in visual working memory capacity," Nature 428, pp. 748-751, Apr. 2004. https://doi.org/10.1038/nature02447