Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
Top Cited Papers
- 24 May 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 110-124
- https://doi.org/10.1109/sp.2005.19
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Optical time-domain eavesdropping risks of CRT displaysPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Encrypted key exchange: password-based protocols secure against dictionary attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A composable framework for secure multi-modal access to Internet services from post-PC devicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Selecting Cryptographic Key SizesJournal of Cryptology, 2001
- The Bluetooth radio systemIEEE Wireless Communications, 2000
- Soft Tempest: Hidden Data Transmission Using Electromagnetic EmanationsPublished by Springer Nature ,1998
- The Internet Key Exchange (IKE)Published by RFC Editor ,1998
- Augmented encrypted key exchangePublished by Association for Computing Machinery (ACM) ,1993
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Polynomial Codes Over Certain Finite FieldsJournal of the Society for Industrial and Applied Mathematics, 1960