Virtual Password Obscuring in Avoidance of Keyloggers
Abstract
Keywords
Full Text:
PDFReferences
A. Pashalidis and C. J. Mitchell. Impostor: A single sign-on system for use from untrusted devices. Proceedings of IEEE Globecom, 2004.
KLASSP: Entering password on a spyware infected machine using a shared secret proxy. Proceedings of 22nd Annual Computer Security Applications Conference 2006
Dinei Florˆencio and Cormac Herley. How To Login From an Internet Caf´e without Worrying about Keyloggers. Symp. on Usable Privacy and Security, 2006.
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih Li, and Li Liu, A Virtual Password Scheme to Protect Passwords ICC 2008 proceedings
Narges Arastouie, Mohammad Reza Razzazi. Hunter : An Anti-Spyware for Windows Operating System
Daphna Weinshall, Cognitive Authentication Schemes Safe Against Spyware
Combating Spam, Spyware, and Other Desktop Intrusions IEEE Security & Privacy 2006
P.Cisar, S. Maravic Cisar. Password a Form of Authentication. SISY 2007. 5th International Symposium on Intelligent Systems and Informatics. 24-25 August, 2007 Subotica, Serbia
E. Gaber, P. Gibbons, Y. Matyas, and A. Mayer. How to make personalized web browsing simple, secure and anonymous. Proc. Finan. Crypto ’97.
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. Proceedings of the 14th Usenix Security Symposium, 2005.
J. A. Halderman, B. Waters, and E. Felten. A convenient method for securely managing passwords. Proceedings of the 14th International World Wide Web Conference (WWW 2005).
D. Tan, P. Keryana, and M. Czerwinski. Spy-resistant keyboard: more secure password entry on public touch screen displays. CHISIG’05.
Self-Healing Spyware: Detection and Remediation IEEE Transactions on Reliability vol.56, No.4, December 2007
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.