A De Luca, A Hang, F Brudy, C Lindner, H Hussmann - 2012 - medien.ifi.lmu.de
Password patterns, as used on current Android phones, and other shape-based authentication schemes are highly usable and memorable. In terms of security, they are …
A De Luca, A Hang, F Brudy, C Lindner… - 2012 - medien.informatik.uni-muenchen.de
Password patterns, as used on current Android phones, and other shape-based authentication schemes are highly usable and memorable. In terms of security, they are …
A De Luca, A Hang, F Brudy, C Lindner, H Hussmann - 2012 - academia.edu
Password patterns, as used on current Android phones, and other shape-based authentication schemes are highly usable and memorable. In terms of security, they are …
A De Luca, A Hang, F Brudy, C Lindner, H Hussmann - 2012 - Citeseer
Password patterns, as used on current Android phones, and other shape-based authentication schemes are highly usable and memorable. In terms of security, they are …
A De Luca, A Hang, F Brudy, C Lindner, H Hussmann - 2012 - mmi.ifi.lmu.de
Password patterns, as used on current Android phones, and other shape-based authentication schemes are highly usable and memorable. In terms of security, they are …
A De Luca, A Hang, F Brudy, C Lindner, H Hussmann - fbrudy.net
Password patterns, as used on current Android phones, and other shape-based authentication schemes are highly usable and memorable. In terms of security, they are …
A De Luca, A Hang, F Brudy, C Lindner, H Hussmann - 2012 - medien.ifi.lmu.de
Password patterns, as used on current Android phones, and other shape-based authentication schemes are highly usable and memorable. In terms of security, they are …