Using mouse strokes to verify user identity
As the technology advances, many interesting approaches have emerged to tackle the flaw of the traditional authentication techniques which verify users based on something that one knows or possesses. Not only do these systems expose their users to identity theft, users could also forget their passwo...
Saved in:
主要作者: | Toh, Jing Sheng. |
---|---|
其他作者: | School of Computer Engineering |
格式: | Final Year Project |
語言: | English |
出版: |
2013
|
主題: | |
在線閱讀: | http://hdl.handle.net/10356/51958 |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
機構: | Nanyang Technological University |
語言: | English |
相似書籍
-
Using mouse strokes to verify user identity
由: Cheong, Lichang.
出版: (2011) -
Analysis of user influence in slashdot
由: Tan, Qian Ting.
出版: (2011) -
Auto recording of user behaviours in cloud IDE
由: Zhang, Chixiong
出版: (2015) -
Discovery and analysis of social networks based on online user activities
由: Lauw, Hady Wirawan
出版: (2008) -
Can user choice alter experimental findings in human–computer interaction? : similarity attraction versus cognitive dissonance in social responses to synthetic speech
由: Lee, Kwan Min, et al.
出版: (2013)