Author of the publication

A Graphical Password Scheme Strongly Resistant to Spyware.

, , , and . Security and Management, page 94-100. CSREA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis Of Web Search Algorithm Hits., and . Int. J. Found. Comput. Sci., 15 (4): 649-662 (2004)Probabilistic behavior of hash tables, , and . CoRR, (2003)Markov Tree Prediction on Web Cache Prefetching., , and . Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, volume 209 of Studies in Computational Intelligence, Springer, (2009)A Graphical Password Scheme Strongly Resistant to Spyware., , , and . Security and Management, page 94-100. CSREA Press, (2004)A Wavelet-Based Almost-Sure Uniform Approximation of Fractional Brownian Motion with a Parallel Algorithm., , , and . J. Appl. Probab., 51 (1): 1-18 (2014)Development of Maximized Total Capillary Surface: the quater power scaling law from developmental biology perspective., , , and . BIOCOMP, page 217-221. CSREA Press, (2006)A Shoulder-Surfing Resistant Graphical Password Scheme - WIW., , and . Security and Management, page 105-111. CSREA Press, (2003)A computational model for signaling pathways in bounded small-world networks corresponding to brain size., , , and . Neurocomputing, 74 (18): 3793-3799 (2011)Modeling and Practice on Component Based Software Design - a Case Study., , and . SNPD (1), page 676-681. IEEE Computer Society, (2007)