2006
DOI: 10.1007/11613022_28
|View full text |Cite
|
Sign up to set email alerts
|

A User Authentication System Using Schema of Visual Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
24
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 25 publications
(25 citation statements)
references
References 2 publications
1
24
0
Order By: Relevance
“…This section provides a brief overview of the basic system [6]. To solve the problems with conventional image-based authentication systems (user authentication systems using original images), a user authentication system using "unclear images" as passimages has been proposed.…”
Section: Concept Underlying Basic Systemmentioning
confidence: 99%
See 3 more Smart Citations
“…This section provides a brief overview of the basic system [6]. To solve the problems with conventional image-based authentication systems (user authentication systems using original images), a user authentication system using "unclear images" as passimages has been proposed.…”
Section: Concept Underlying Basic Systemmentioning
confidence: 99%
“…Actually, two kinds of experiments with a two-alternative authentication system 1 have been carried out by Harada et al [6]. 1 The user had to memorize one pass-image in this experiment, and one decoy image was presented along with the pass-image in each authentication phase.…”
Section: Achievements and Problems With Basic Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…Examples include using images of cartoon characters [3], images of geometric shapes [14] and using images that were later transformed into unclear or distorted forms during login [15] and [16]. With respect to the click-based method, a technique known as persuasion has been proposed [17] where the software recommends to the user possible 'safe' areas in which to create their secrets.…”
mentioning
confidence: 99%