On the security and usability of segment-based visual cryptographic authentication protocols. Wang, T., Ge, H., Chowdhury, O., Maji, H. K, & Li, N. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 603–615, 2016. bibtex @inproceedings{wang2016security,
title={On the security and usability of segment-based visual cryptographic authentication protocols},
author={Wang, Tianhao and Ge, Huangyi and Chowdhury, Omar and Maji, Hemanta K and Li, Ninghui},
booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
pages={603--615},
year={2016}
}
Downloads: 0
{"_id":"auowwJQBmPHtH8v53","bibbaseid":"wang-ge-chowdhury-maji-li-onthesecurityandusabilityofsegmentbasedvisualcryptographicauthenticationprotocols-2016","author_short":["Wang, T.","Ge, H.","Chowdhury, O.","Maji, H. K","Li, N."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"On the security and usability of segment-based visual cryptographic authentication protocols","author":[{"propositions":[],"lastnames":["Wang"],"firstnames":["Tianhao"],"suffixes":[]},{"propositions":[],"lastnames":["Ge"],"firstnames":["Huangyi"],"suffixes":[]},{"propositions":[],"lastnames":["Chowdhury"],"firstnames":["Omar"],"suffixes":[]},{"propositions":[],"lastnames":["Maji"],"firstnames":["Hemanta","K"],"suffixes":[]},{"propositions":[],"lastnames":["Li"],"firstnames":["Ninghui"],"suffixes":[]}],"booktitle":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","pages":"603–615","year":"2016","bibtex":"@inproceedings{wang2016security,\n title={On the security and usability of segment-based visual cryptographic authentication protocols},\n author={Wang, Tianhao and Ge, Huangyi and Chowdhury, Omar and Maji, Hemanta K and Li, Ninghui},\n booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},\n pages={603--615},\n year={2016}\n}\n\t\n","author_short":["Wang, T.","Ge, H.","Chowdhury, O.","Maji, H. K","Li, N."],"key":"wang2016security","id":"wang2016security","bibbaseid":"wang-ge-chowdhury-maji-li-onthesecurityandusabilityofsegmentbasedvisualcryptographicauthenticationprotocols-2016","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://tianhao.wang/files/tianhao.bib","dataSources":["9JysS8QexwC3GJ3Ct"],"keywords":[],"search_terms":["security","usability","segment","based","visual","cryptographic","authentication","protocols","wang","ge","chowdhury","maji","li"],"title":"On the security and usability of segment-based visual cryptographic authentication protocols","year":2016}