Sie sind auf Seite 1von 3

Pedersen, A. B. (2010). Usability of authentication in web applications–a literature review.

July, 8,
31.

Rader, E., Wash, R., & Brooks, B. (2012, July). Stories as informal lessons about security.
In Proceedings of the Eighth Symposium on Usable Privacy and Security (p. 6). ACM.

Gaw, S., & Felten, E. W. (2006, July). Password management strategies for online accounts.
In Proceedings of the second symposium on Usable privacy and security (pp. 44-55). ACM.

Heo, J., Hong, C. S., Choi, M. S., Ju, S. H., & Lim, Y. H. (2008, April). Identity-based mutual
device authentication schemes for PLC system. In 2008 IEEE International Symposium on Power
Line Communications and Its Applications (pp. 47-51). IEEE.

Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of
solutions. Journal of Systems and Software, 86(9), 2263-2268.

Weise, J. (2001). Public key infrastructure overview. Sun BluePrints OnLine, August, 1-27.

Al-Riyami, S. S., & Paterson, K. G. (2003, November). Certificateless public key cryptography.
In International conference on the theory and application of cryptology and information
security (pp. 452-473). Springer, Berlin, Heidelberg.

Tuecke, S., Welch, V., Engert, D., Pearlman, L., & Thompson, M. (2004). Internet X. 509 public
key infrastructure (PKI) proxy certificate profile (No. RFC 3820).

Kou, W. (Ed.). (2013). Payment technologies for E-commerce. Springer Science & Business
Media.

Slagell, A., Bonilla, R., & Yurcik, W. (2006, April). A survey of PKI components and scalability
issues. In 2006 IEEE International Performance Computing and Communications
Conference (pp. 10-pp). IEEE.
Almuairfi, S., Veeraraghavan, P., & Chilamkurti, N. (2013). A novel image-based implicit
password authentication system (IPAS) for mobile and non-mobile devices. Mathematical and
Computer Modelling, 58(1-2), 108-116.

Logue, J. D., Supramaniam, S., Hardison, O. B., & Luxemberg, J. A. (2013). U.S. Patent No.
8,539,567. Washington, DC: U.S. Patent and Trademark Office.

Glass, R., Salganicoff, M., & Von Seelen, U. C. (2001). U.S. Patent No. 6,332,193. Washington,
DC: U.S. Patent and Trademark Office.

Schneier, B., Walker, J., & Jorasch, J. (1998). U.S. Patent No. 5,768,382. Washington, DC: U.S.
Patent and Trademark Office.

Fang, L. (2010). Security framework for MPLS and GMPLS networks (No. RFC 5920).

Katz, J., Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied
cryptography. CRC press.

Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols
for sensor networks. Wireless networks, 8(5), 521-534.

Dierks, T., & Rescorla, E. (2008). The transport layer security (TLS) protocol version 1.2 (No.
RFC 5246).

Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press.

Kaur, T., & Kakkar, A. G. (2017). Sharing of a Digital Secret Image by Diverse Media for more
Security (Doctoral dissertation).

Thakur, J., & Kumar, N. (2011). DES, AES and Blowfish: Symmetric key cryptography
algorithms simulation based performance analysis. International journal of emerging technology
and advanced engineering, 1(2), 6-12.

Stamp, M. (2011). Information security: principles and practice. John Wiley & Sons.

Sun, H. M., Wu, M. E., Ting, W. C., & Hinek, M. J. (2007). Dual RSA and its security
analysis. IEEE Transactions on Information Theory, 53(8), 2922-2933.

Rescorla, E. (2018). The transport layer security (TLS) protocol version 1.3 (No. RFC 8446).
Hardjono, T., & Tsudik, G. (2000, July). IP multicast security: Issues and directions. In Annales
des télécommunications(Vol. 55, No. 7-8, pp. 324-340). Springer-Verlag.

Zhang, D. D. (2013). Automated biometrics: Technologies and systems (Vol. 7). Springer Science
& Business Media.

Jain, A. K., Bolle, R., & Pankanti, S. (Eds.). (2006). Biometrics: personal identification in
networked society (Vol. 479). Springer Science & Business Media.

Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE
Transactions on circuits and systems for video technology, 14(1).

Sun, Z., Wang, Y., Qu, G., & Zhou, Z. (2016). A 3‐D hand gesture signature based biometric
authentication system for smartphones. Security and Communication Networks, 9(11), 1359-1373.

Fasel, B., & Luettin, J. (2003). Automatic facial expression analysis: a survey. Pattern
recognition, 36(1), 259-275.

Maltoni, D., Maio, D., Jain, A. K., & Prabhakar, S. (2009). Handbook of fingerprint recognition.
Springer Science & Business Media.

Das könnte Ihnen auch gefallen