Computer Science ›› 2014, Vol. 41 ›› Issue (4): 99-102.
Previous Articles Next Articles
HU Wei,ZHANG Huan-guo,WEI Guo-heng and ZHOU Xue-guang
[1] Hu Wei,Wu Xiao-ping,Wei Guo-heng.The Security Analysis of Graphical Passwords [C]∥2010International Conference on Communications and Intelligence Information Security.ICCIIS2010.2010:200-203 [2] 胡卫,吴晓平,张昌宏,等.图形密码身份认证方案设计及其安全性分析[J].计算机工程与设计,2009,0(14):3284-3287 [3] Suo X,Zhu Y,Owen G S.Graphical passwords:A survey[C]∥21st Annual Computer Security Applications Conference (ACSAC’05).2005:463-472 [4] Chiasson S,Biddle R,van Oorschot P C.A Second Look at the Usability of Click-Based Graphical Passwords[C]∥Symposium On Usable Privacy and Security (SOUPS) 2007.Pittsburgh,PA,USA,2007:18-20 [5] Birget J C,Hong D,Memon N.Graphical Passwords Based onRobust Discretization[J].IEEE Transactions on Information Forensics and Security,2006,1(3):395-399 [6] 汪永松.Android平台开发之旅[M].北京:机械工业出版社,2010 [7] 丰华,于松波.Eclipse开发技术详解[M].北京:中国铁道出版社,2010 |
No related articles found! |
|