<--- Back to Details
First PageDocument Content
Humancomputer interaction / Computer security / Computer access control / Password / Security / Cybercrime / Security token / Eye tracking / Virtual keyboard / Challengeresponse authentication / Keystroke logging / Keystroke dynamics
Date: 2007-05-29 23:54:36
Humancomputer interaction
Computer security
Computer access control
Password
Security
Cybercrime
Security token
Eye tracking
Virtual keyboard
Challengeresponse authentication
Keystroke logging
Keystroke dynamics

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Download Document from Source Website

File Size: 3,33 MB

Share Document on Facebook

Similar Documents

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

DocID: 1rp54 - View Document

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

DocID: 1rbBu - View Document

l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

DocID: 1raql - View Document

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and  Terrance E. Boult

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

DocID: 1r7Iu - View Document

Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2)  Definition of zero-knowledge (ZK)

Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2) Definition of zero-knowledge (ZK)

DocID: 1qVFc - View Document