•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Keylogging-Resistant Visual Authentication Protocols

Author:
DaeHun Nyang
,
Mohaisen, Aziz
,
Kang, Jiawen
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/TMC.2014.2307331
URI: https://libsearch.um.ac.ir:443/fum/handle/fum/1123676
Keyword(s): computer network security,cryptographic protocols,data visualisation,microcomputers,PC untrusted devices,authentication attacks,keylogging resistant visual authentication protocols,one-time password protocol,password-based authentication protocol,personal computers,security design,security enhancement,security requirements satisfaction,user behavior,user experience,visualization design,Authentication,Keyboards,Protocols,Servers,Usability,Visualization,Authentication,keylog
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Keylogging-Resistant Visual Authentication Protocols

Show full item record

contributor authorDaeHun Nyang
contributor authorMohaisen, Aziz
contributor authorKang, Jiawen
date accessioned2020-03-12T23:47:50Z
date available2020-03-12T23:47:50Z
date issued2014
identifier issn1536-1233
identifier other6746187.pdf
identifier urihttps://libsearch.um.ac.ir:443/fum/handle/fum/1123676
formatgeneral
languageEnglish
publisherIEEE
titleKeylogging-Resistant Visual Authentication Protocols
typeJournal Paper
contenttypeMetadata Only
identifier padid8303167
subject keywordscomputer network security
subject keywordscryptographic protocols
subject keywordsdata visualisation
subject keywordsmicrocomputers
subject keywordsPC untrusted devices
subject keywordsauthentication attacks
subject keywordskeylogging resistant visual authentication protocols
subject keywordsone-time password protocol
subject keywordspassword-based authentication protocol
subject keywordspersonal computers
subject keywordssecurity design
subject keywordssecurity enhancement
subject keywordssecurity requirements satisfaction
subject keywordsuser behavior
subject keywordsuser experience
subject keywordsvisualization design
subject keywordsAuthentication
subject keywordsKeyboards
subject keywordsProtocols
subject keywordsServers
subject keywordsUsability
subject keywordsVisualization
subject keywordsAuthentication
subject keywordskeylog
identifier doi10.1109/TMC.2014.2307331
journal titleMobile Computing, IEEE Transactions on
journal volume13
journal issue11
filesize1389771
citations0
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace