A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices
- 1 January 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Authenticating Pervasive Devices with Human ProtocolsLecture Notes in Computer Science, 2005
- Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)Lecture Notes in Computer Science, 2005
- Secure Human Identification ProtocolsLecture Notes in Computer Science, 2001
- Human Identification Through Insecure ChannelPublished by Springer Science and Business Media LLC ,2001
- A Secure Human-Computer Authentication SchemePublished by Defense Technical Information Center (DTIC) ,2000
- Human-computer cryptographyPublished by Association for Computing Machinery (ACM) ,1996
- The S/KEY One-Time Password System1995
- On the Matsumoto and Imai’s Human Identification SchemeLecture Notes in Computer Science, 1995
- Why cryptosystems failCommunications of the ACM, 1994
- Password authentication with insecure communicationCommunications of the ACM, 1981