Used together with:
graphic
(1)
distort
(1)
kind
(1)
scheme
(1)
evalu
(1)
Stem
obscur$ (
all stems
)
1 papers:
CHI-2011-HayashiHC
#authentication
#security
#visual notation
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes (
EH
,
JIH
,
NC
), pp. 2055–2064.
Bibliography of Software Language Engineering in Generated Hypertext
(
BibSLEIGH
) is created and maintained by
Dr. Vadim Zaytsev
.
Hosted as a part of
SLEBOK
on
GitHub
.