Login / Signup
A gesture-based authentication scheme for untrusted public terminals.
Shwetak N. Patel
Jeffrey S. Pierce
Gregory D. Abowd
Published in:
UIST (2004)
Keyphrases
</>
authentication scheme
smart card
secret key
user authentication
image encryption
public key
third party
human computer interaction
security analysis
security flaws
authentication protocol
image authentication
real time
web services
low cost
privacy preserving