Search Results - (( java general connection algorithm ) OR ( java implementation force algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7