|
[AM13]I. AM and P. Patil, “Graphical password authentication using persuasive cued click point,” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, Issue 7, July 2013. [Bidd11]R. Biddle, S. Chiasson, and P. C. Van Oorschot, “Graphical passwords: learning from the first twelve years,” Technical Report TR-11-01, School of Computer Science, Carleton University, 2011. [Bidd12]R. Biddle, S. Chiasson, and P. C. Van Oorschot, “Graphical passwords: learning from the first twelve years,” ACM Computing Surveys (CSUR), vol. 44, no. 4, article 19, 2012. [Chen12] W. P. Chen, “Design and in-depth analysis of graphical passwords with resistance to login-recording attacks,” Master’s Thesis, National Taichung University of Education, 2012. [Hoan08]B. Hoanca and K. Mock, “Password entry scheme resistant to eavesdropping,” Proceedings of the International Conference on Security and Management, 2008. [Imra11]Z. Imran and R. Nizami, “Advance secure login,” International Journal of Scientific and Research Publications, vol. 1, 2011. [Kim11]S. H. Kim, J. W. Kim, S. Y. Kim, and H. G. Cho, “A new shoulder-surfing resistant password for mobile environments,” Proceeding of the 5th International Conference on Ubiquitous Information Management and Communication, 2011. [Ku14]W. C. Ku, D. M. Liao, C. J. Chang, and P. J. Qiu, “An enhanced capture attacks resistant text-based graphical password scheme,” International Conference on Communications in China (ICCC), 2014, pp.204–208. [Ku16]W. C. Ku, B. R. Cheng, Y. C. Yeh, and C. J. Chang, “A simple sector-based textual-graphical password scheme with resistance to login-recording attacks,” IEICE Transactions on Information and Systems, vol. E99-D, no. 2, pp. 529–532, Feb. 2016. [Lada13]A. Ladage, S. Gaikwad, and A. Chougule, “Graphical based password authentication,” International Journal of Engineering Research & Technology, vol. 2, Issue 4, 2013. [Mulw13]K. Mulwani, S. Naik, N. Gurnani, N. Giri, and S. Sengupta, “3LAS (three level authentication scheme),” International Journal of Emerging Technology and Advanced Engineering, vol. 3, pp.103–107, 2013.
[Rao12]M. K. Rao and S. Yalamanchili, “Novel shoulder-surfing resistant authentication schemes using text-graphical passwords,” International Journal of Information & Network Security, vol. 1, no. 3, pp. 163–170, 2012. [Sobr02]L. Sobrado and J. C. Birget, “Graphical passwords,” The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002. [Sree11]M. Sreelatha, M. Shashi, M. Anirudh, M. Sultan Ahamer, and V. M. Kumar, “Authentication schemes for session passwords using color and images,” International Journal of Network Security & Its Applications, Vol. 3, No. 3, pp. 111–119, 2011. [TLS18]Network Working Group of the IETF, The Transport Layer Security (TLS) protocol version 1.3, RFC 8446, 2018. [Yeh11]Y. C. Yeh, W. C. Ku, W. P. Chen, and Y. L. Chen, “An easy-to-use login-recording attacks resistant password scheme,” Proceedings of the 2011 Conference on Innovative Applications of Information Security Technology, 2011. [Zhao07]H. Zhao and X. Li, “S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme,” Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, vol. 2, pp. 467–472, 2007.
|