Leakage-resilient password entry: Challenges, design, and evaluation.
Qiang YanJin HanYingjiu LiJianying ZhouRobert H. DengPublished in: Comput. Secur. (2015)
Keyphrases
- case study
- user interface
- lessons learned
- genetic algorithm
- evaluation method
- poses unique challenges
- machine learning
- key issues
- neural network
- design process
- optimal design
- evaluation metrics
- design principles
- computer aided
- power consumption
- software architecture
- building blocks
- knowledge based systems
- information technology
- knowledge base
- data mining