A New Approach for Visual Cryptography
Designs, Codes and Cryptography
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
The Untrusted Computer Problem and Camera-Based Authentication
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The General Neural-Network Paradigm for Visual Cryptography
IWANN '01 Proceedings of the 6th International Work-Conference on Artificial and Natural Neural Networks: Connectionist Models of Neurons, Learning Processes and Artificial Intelligence-Part I
A neural-network approach for visual cryptography and authorization
Design and application of hybrid intelligent systems
Security Parallels between People and Pervasive Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
XOR-based Visual Cryptography Schemes
Designs, Codes and Cryptography
Cheating in Visual Cryptography
Designs, Codes and Cryptography
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Image encryption by random grids
Pattern Recognition
The semipublic encryption for visual cryptography using Q'tron neural networks
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Integrated Computer-Aided Engineering
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Sharing multiple secrets in visual cryptography
Pattern Recognition
Mutual image-based authentication framework with JPEG2000 in wireless environment
EURASIP Journal on Wireless Communications and Networking
Rapid Trust Establishment for Pervasive Personal Computing
IEEE Pervasive Computing
Halting password puzzles: hard-to-break encryption from human-memorable keys
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Image encryption by multiple random grids
Pattern Recognition
Visual secret sharing by random grids revisited
Pattern Recognition
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Sharing visual multi-secrets using circle shares
Computer Standards & Interfaces
Halftone visual cryptography via error diffusion
IEEE Transactions on Information Forensics and Security
Friendly Color Visual Secret Sharing by Random Grids
Fundamenta Informaticae
HPAKE: Password Authentication Secure against Cross-Site User Impersonation
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Depress phishing by CAPTCHA with OTP
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Efficient receipt-free ballot casting resistant to covert channels
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
A comprehensive study of visual cryptography
Transactions on data hiding and multimedia security V
Threshold visual secret sharing by random grids
Journal of Systems and Software
Using multiple smart cards for signing messages at malicious terminals
ISC'06 Proceedings of the 9th international conference on Information Security
ICIAR'06 Proceedings of the Third international conference on Image Analysis and Recognition - Volume Part I
Visual document authentication using human-recognizable watermarks
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A user-friendly approach to human authentication of messages
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Multi-image encryption by circular random grids
Information Sciences: an International Journal
Visual cryptography for digital watermarking in still images
PCM'04 Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Mitigating dictionary attacks on password-protected local storage
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Polling with physical envelopes: a rigorous analysis of a human-centric protocol
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
hPIN/hTAN: a lightweight and low-cost e-banking solution against untrusted computers
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
High-Entropy visual identification for touch screen devices
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Authenticating visual cryptography shares using 2d barcodes
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Practical receipt authentication for branchless banking
Proceedings of the 3rd ACM Symposium on Computing for Development
Natural language letter based visual cryptography scheme
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |