DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bianchi, Andrea | ko |
dc.contributor.author | Ian Roland, Oakley | ko |
dc.contributor.author | Kwon, Dong-Soo | ko |
dc.date.accessioned | 2013-03-12T07:11:41Z | - |
dc.date.available | 2013-03-12T07:11:41Z | - |
dc.date.created | 2012-06-11 | - |
dc.date.created | 2012-06-11 | - |
dc.date.created | 2012-06-11 | - |
dc.date.created | 2012-06-11 | - |
dc.date.created | 2012-06-11 | - |
dc.date.created | 2012-06-11 | - |
dc.date.issued | 2012-04 | - |
dc.identifier.citation | COMPUTER, v.45, no.4, pp.58 - 65 | - |
dc.identifier.issn | 0018-9162 | - |
dc.identifier.uri | http://hdl.handle.net/10203/101621 | - |
dc.description.abstract | Invisible input and output modalities, such as haptics and audio, are a potentially effective defense against observation-based attacks on PIN entry systems. However, the successful implementation of such systems calls for some general design guidelines. | - |
dc.language | English | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | Open Sesame: Design Guidelines for Invisible Passwords | - |
dc.type | Article | - |
dc.identifier.wosid | 000302458300014 | - |
dc.identifier.scopusid | 2-s2.0-84859798125 | - |
dc.type.rims | ART | - |
dc.citation.volume | 45 | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 58 | - |
dc.citation.endingpage | 65 | - |
dc.citation.publicationname | COMPUTER | - |
dc.identifier.doi | 10.1109/MC.2012.109 | - |
dc.contributor.localauthor | Bianchi, Andrea | - |
dc.contributor.localauthor | Ian Roland, Oakley | - |
dc.contributor.localauthor | Kwon, Dong-Soo | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.