<--- Back to Details
First PageDocument Content
Humancomputer interaction / Computer security / Computer access control / Password / Security / Cybercrime / Security token / Eye tracking / Virtual keyboard / Challengeresponse authentication / Keystroke logging / Keystroke dynamics
Date: 2007-05-29 23:54:36
Humancomputer interaction
Computer security
Computer access control
Password
Security
Cybercrime
Security token
Eye tracking
Virtual keyboard
Challengeresponse authentication
Keystroke logging
Keystroke dynamics

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Download Document from Source Website

File Size: 3,33 MB

Share Document on Facebook

Similar Documents

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

DocID: 1qsWC - View Document

Defeat Spyware With Anti-Screen Capture Technology Using Visual Persistence Johnny Lim Netrust 10 Collyer Quay, #09-05 Ocean Building, Singapore

Defeat Spyware With Anti-Screen Capture Technology Using Visual Persistence Johnny Lim Netrust 10 Collyer Quay, #09-05 Ocean Building, Singapore

DocID: 1pQfZ - View Document

Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail  All materials is licensed under a Creative

Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail All materials is licensed under a Creative

DocID: 1oJSn - View Document

Advertising: Perfect Keylogger for Mac - high-quality invisible Mac OS X keylogger with remote monitoring support! In this file we offer a discount coupon for $% off). Enter this coupon code: 70596ACF on our ord

Advertising: Perfect Keylogger for Mac - high-quality invisible Mac OS X keylogger with remote monitoring support! In this file we offer a discount coupon for $% off). Enter this coupon code: 70596ACF on our ord

DocID: 1oEZR - View Document

Piercing the HawkEye: Nigerian Cybercriminals Use a Simple Keylogger to Prey on SMBs Worldwide Ryan Flores and Lord Remorin Trend Micro Forward-Looking Threat Research Team with Mary Yambao and Don Ladores

Piercing the HawkEye: Nigerian Cybercriminals Use a Simple Keylogger to Prey on SMBs Worldwide Ryan Flores and Lord Remorin Trend Micro Forward-Looking Threat Research Team with Mary Yambao and Don Ladores

DocID: 1owas - View Document