On designing usable and secure recognition-based graphical authentication mechanisms.
Martin MihajlovBorka Jerman-BlazicPublished in: Interact. Comput. (2011)
Keyphrases
- security mechanisms
- security services
- authentication scheme
- recognition rate
- authentication mechanism
- security requirements
- user authentication
- authentication protocol
- object recognition
- security analysis
- password authentication
- recognition accuracy
- key distribution
- identity management
- security issues
- data encryption
- integrity verification
- access control
- factor authentication
- feature extraction
- automatic recognition
- secure manner
- pattern recognition
- smart card
- key management
- public key cryptography
- electronic payment
- identity authentication
- public key infrastructure