First Page | Document Content | |
---|---|---|
Date: 2007-05-29 23:54:36Password Keystroke dynamics Eye tracking Keystroke logging Security token Virtual keyboard Challenge-response authentication Partial Password OTPW Human–computer interaction Security Computing | Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.docAdd to Reading ListSource URL: cups.cs.cmu.eduDownload Document from Source WebsiteFile Size: 3,33 MBShare Document on Facebook |
1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡DocID: 1xUUI - View Document | |
YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X LoginDocID: 1o9AS - View Document | |
Three-factor user authentication method using biometrics challenge response Haruhiko Fujii, Yukio Tsuruoka Nippon Telegraph and Telephone Corporation {fujii.haruhiko, tsuruoka.yukio}@lab.ntt.co.jp Abstract: We propose aDocID: 1lxXl - View Document | |
Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David WagnerDocID: 1fJRY - View Document | |
draft-melnikov-httpbis-scram-auth-01 - Salted Challenge Response …SCRAM— HTTP Authentication MechanismDocID: 1e7OC - View Document |