A Proxy User Authentication Protocol Using Source-Based Image Morphing. Mao, Q., Bharanitharan, K., & Chang, C. Comput. J. (CJ), 58(7):1573-1584, 2015.
A Proxy User Authentication Protocol Using Source-Based Image Morphing [link]Paper  bibtex   
@article{ dblp1647419,
  title = {A Proxy User Authentication Protocol Using Source-Based Image Morphing},
  author = {Qian Mao and K. Bharanitharan and Chin-Chen Chang},
  author_short = {Mao, Q. and Bharanitharan, K. and Chang, C.},
  bibtype = {article},
  type = {article},
  year = {2015},
  key = {dblp1647419},
  id = {dblp1647419},
  biburl = {http://www.dblp.org/rec/bibtex/journals/cj/MaoBC15},
  url = {http://dx.doi.org/10.1093/comjnl/bxu094},
  journal = {Comput. J. (CJ)},
  pages = {1573-1584},
  number = {7},
  volume = {58},
  text = {Comput. J. (CJ) 58(7):1573-1584 (2015)}
}

Downloads: 0