Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Multi-factor authentication: A survey
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …
enablers to maintain this process secure is authentication. It covers many different areas of a …
Determinants of behavioral intention to mobile banking
JC Gu, SC Lee, YH Suh - Expert Systems with Applications, 2009 - Elsevier
With the improvement of mobile technologies and devices, banking users are able to
conduct banking services at anyplace and at anytime. Recently, many banks in the world …
conduct banking services at anyplace and at anytime. Recently, many banks in the world …
Touch me once and i know it's you! implicit authentication based on touch screen patterns
Password patterns, as used on current Android phones, and other shape-based
authentication schemes are highly usable and memorable. In terms of security, they are …
authentication schemes are highly usable and memorable. In terms of security, they are …
[KNIHA][B] Computer security: principles and practice
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …
programmers, system managers, network managers, product marketing personnel, system …
PassPoints: Design and longitudinal evaluation of a graphical password system
S Wiedenbeck, J Waters, JC Birget, A Brodskiy… - International journal of …, 2005 - Elsevier
Computer security depends largely on passwords to authenticate human users. However,
users have difficulty remembering passwords over time if they choose a secure password, ie …
users have difficulty remembering passwords over time if they choose a secure password, ie …
Net valence analysis of iris recognition technology-based FinTech
Iris recognition technology (IRT)-based authentication is a biometric financial technology
(FinTech) application used to automate user recognition and verification. In addition to being …
(FinTech) application used to automate user recognition and verification. In addition to being …
A survey of user interaction for spontaneous device association
In a wireless world, users can establish ad hoc virtual connections between devices that are
unhampered by cables. This process is known as spontaneous device association. A wide …
unhampered by cables. This process is known as spontaneous device association. A wide …
Authentication using graphical passwords: Effects of tolerance and image choice
S Wiedenbeck, J Waters, JC Birget, A Brodskiy… - Proceedings of the …, 2005 - dl.acm.org
Graphical passwords are an alternative to alphanumeric passwords in which users click on
images to authenticate themselves rather than type alphanumeric strings. We have …
images to authenticate themselves rather than type alphanumeric strings. We have …
Secure biometric authentication with de-duplication on distributed cloud storage
Cloud computing is one of the evolving fields of technology, which allows storage, access of
data, programs, and their execution over the internet with offering a variety of information …
data, programs, and their execution over the internet with offering a variety of information …
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …