Concepedia

Publication | Closed Access

Photographic authentication through untrusted terminals

82

Citations

15

References

2003

Year

Abstract

As a technique for authentication through untrusted public Internet terminals, photographic authentication relies on a person's ability to recognize personal photographs. The results from the authors' study demonstrate that this technique can reasonably withstand replay attacks, a common vulnerability of many existing techniques.

References

YearCitations

1991

13.7K

2000

697

1970

670

2002

409

1994

346

1969

342

1970

235

1999

201

1980

175

1998

92

Page 1