Heuristic Attack on Graphic Password Generation.
Schalk Willem PeachJohannes VorsterRenier van HeerdenPublished in: SAISMC (2010)
Keyphrases
- dynamic programming
- authentication mechanism
- search algorithm
- generation method
- tabu search
- optimal solution
- greedy heuristic
- heuristic methods
- intrusion detection
- simulated annealing
- constraint satisfaction
- intrusion detection system
- countermeasures
- evolutionary algorithm
- attack detection
- key exchange protocol
- neural network