1 |
Sang-Jo Youk, Seung-Sun Yoo, Gil-cheol Park, and Tai-hoon Kim, "Design of Internet Phone (VoIP) for Voice Security using the VPN", International Journal of Multimedia and Ubiquitous Engineering, Vol.2, No.4, pp.55-66, 2007.
|
2 |
Seung Wook Jung, "CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone", International Journal of Security and Its Applications, Vol.6, No.3, pp.29-36, 2012.
|
3 |
Ali Fahmi Perwira Negara, Elyor Kodirov, Mohd Fikri Azli Abdullah, Deok-Jai Choi, Guee-Sang Lee and Shohel Sayeed, "Arm's Flex when Responding Call for Implicit User Authentication in Smartphone", International Journal of Security and Its Applications, Vol.6, No.3, pp.55-64, 2012.
|
4 |
Jin Baek Kim and Sungmin Kang, "A Study on the Factors Affecting the Intention to Use Smartphone Banking: The Differences between the Transactions of Account Check and Account Transfer", International Journal of Multimedia and Ubiquitous Engineering, Vol.7, No.3, pp.87-96, 2012.
|
5 |
I. Jermyn, A. Mayer, F. Monrose, M.K. Reiter and A.D. Rubin, "The design and analysis of graphical passwords," Proceedings of the 8th USENIX Security Symposium, pp.1-14, 1999.
|
6 |
I.H. Jeng, D.R. Tsai, H.A. Chen, Y.C. Yen, and C.K. Cheng, "Touch sensitive alphanumeric encrypting PIN pad design based on hamilton connected subgraph recognition," Processing of International Conference on Intelligent Information Hiding and Multimedia Signal, pp.258-261, 2009.
|
7 |
J.Thorpe, P.C. van Oorschot, "Towards Secure Design Choices for Implementing Graphical Passwords", 2004.
|
8 |
H.Gao, Z.Ren, X.Chang, X.Liu, U.Aickelin Story-DAS, "A New Graphical Password Scheme Resistant to Shoulder-Surfing", International Conference on Cyberworlds, 2010.
|
9 |
PassFacesTM, "http://www.realuser.com", last accessed on Dec., 2011.
|
10 |
Rachna Dhamija, "Dejavu A User Study Using Images for Authentication", 2007.
|