Back to Results
First PageMeta Content
Computer crimes / Password / Cryptography / Security token / Keystroke logging / Phishing / Password strength / Partial Password / Security / Computer security / Access control


Graphical Passwords: A Survey Xiaoyuan Suo Ying Zhu G. Scott. Owen Department of Computer Science Georgia State University
Add to Reading List

Document Date: 2005-11-21 16:34:38


Open Document

File Size: 585,73 KB

Share Result on Facebook

City

Tucson / Minneapolis / Sunderland / Lauderdale / Pittsburgh / Passface / Vienna / San Diego / San Deigo / /

Company

Las Vergas NV / Springer-Verlag GmbH / Lucent Technologies Inc. / Real User Corporation / Las Vegas NV / Wiedenbeck / Security Systems / Microsoft / /

Continent

Australia / /

Country

Austria / United States / Canada / United Kingdom / /

/

Event

Product Issues / Product Recall / /

Facility

Mellon University / University of Ottawa / Goldsmiths College / National Institute of Standards / University of London / /

IndustryTerm

bank cards / secure systems / log-in applications / shoulder-surfing resistant algorithm / token-based authentication systems / graphical password algorithms / e - commerce / /

Organization

Owen Department / Rutgers / University of Ottawa / Goldsmiths College / University of London / Georgia State University / /

Person

B. Hawes / S. Gavrila / V / N. Memon / Murray Hill / D. Hong / Thorpe Oorschot / M. Mathews / Adrian Perrig / S. Man / Sasse / Van Oorschot / C. Birget / Zhu G. Scott / /

Position

Major / /

Product

Based Techniques In / /

ProvinceOrState

Minnesota / Florida / California / Arizona / /

PublishedMedium

Computerworld / Communications of the ACM / /

Technology

facial recognition / Information Technology / ATM / Mobile Phones / Mobile Device / mobile devices / shoulder-surfing resistant algorithm / graphical password algorithms / cell phones / second algorithm / PDA / /

URL

www.passlogix.com / www.viskey.com/tech.html / www.realuser.com / /

SocialTag