Publication | Closed Access
Photographic authentication through untrusted terminals
82
Citations
15
References
2003
Year
Hardware SecurityEngineeringUsable SecurityPhotographic Authentication ReliesInformation SecurityPhotographic AuthenticationBiometricsPersonal PhotographsIdentity-based SecurityData PrivacyInformation ForensicsReplay AttacksComputer ScienceMultimedia SecurityAuthentication Access ControlAuthentication ProtocolData SecurityCryptography
As a technique for authentication through untrusted public Internet terminals, photographic authentication relies on a person's ability to recognize personal photographs. The results from the authors' study demonstrate that this technique can reasonably withstand replay attacks, a common vulnerability of many existing techniques.
| Year | Citations | |
|---|---|---|
1991 | 13.7K | |
2000 | 697 | |
1970 | 670 | |
2002 | 409 | |
1994 | 346 | |
1969 | 342 | |
1970 | 235 | |
1999 | 201 | |
1980 | 175 | |
1998 | 92 |
Page 1
Page 1