64
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
129
R
EFERENCES
[1]
Oliver A. Nina, Bryan S. Morse, ”Interactive Smoothing of Handwritten Text Images Using a
Bilateral filter”,
[2]
Barr,”Invitation to Cryptology”,1st edition, Prentice Hall,2002.
[3]
Michael Roe,”A Technical report on Cryptography and evidence”, University Of Cambridge.
[4]
Amalia Rusu and Venu Govindaraju, “Handwritten CAPTCHA: Using the difference in the
abilities of humans and machines in reading handwritten words”,
9th Int’l Workshop on
Frontiers in Handwriting Recognition (IWFHR-9 2004)
[5]
S. N. Srihari and E. J. Keubert, "Integration of handwritten address interpretation technology
into the United States Postal Service Remote Computer Reader System" Proc. Int. Conf.
Document Analysis and Recognition (ICDAR) 1997, IEEE-CS Press, pp. 892-896
[6]
Plamondon and S. N. Srihari,"On-line and off-line handwriting recognition: a comprehensive
survey" IEEE transaction on pattern Analysis and machine Intelligence,2000,22(1),63-84
[7]
Khalil Shihab,” A Backpropagation Neural Network for Computer Network Security”, Journal of
Computer Science 2 (9): 710-715, 2006.
[8]
Li-Hua Li, Iuon-Chang Lin, and Min-Shiang Hwang, ” A Remote Password Authentication Scheme
for Multiserver Architecture Using Neural Networks”, IEEE Transactions On Neural Networks,
VOL. 12, NO. 6, November 2001.
[9]
G. Horng, “Password authentication without using password table,” Inform. Processing Lett.,
vol. 55, pp. 247–250, 1995.
[10]
M. Udi, “A simple scheme to make passwords based on one-way function much harder to
crack,” Computer Security, vol. 15, no. 2, pp. 171–176, 1996.
[11]
Robert Biddle, Sonia Chiasson, P.C. van Oorschot ,” Graphical Passwords: Learning from the
First Twelve Years”, January 4, 2011. Technical Report TR-11-01, School of Computer Science,
Carleton University, 2011.
[12]
Wei-Chi Ku,” Weaknesses and Drawbacks of a Password Authentication Scheme Using Neural
Networks for Multiserver Architecture”, IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 16,
NO. 4, JULY 2005.
[13]
M. S. Obaidat and D. T. Macchiarolo, “An on-line neural-network system for computer access
security,” IEEE Trans. Ind. Electron., vol. 40, pp. 235–242, 1993.
[14]
“A multilayer neural-network system for computer access security,” IEEE Trans. Syst., Man,
Cybern., vol. 24, pp. 806–813,May 1994.
[15]
T. Schmidt, H. Rahnama , A. Sadeghian, “A Review Of Applications Of Artificial Neural Networks
In Cryptosystems”,Seventh International Symposium on Neural Networks, June 6-
9, 2010 Shanghai, China.
[16]
G. Agarwal and R.S. Shukla,” Security Analysis of Graphical Passwords over the Alphanumeric
Passwords “, Int. J. Pure Appl. Sci. Technol., 2010.
[17]
Xiaoyuan Suo, Ying Zhu, and G. Scott Owen, "Graphical Passwords: A Survey", Proceedings of
21st Annual Computer Security Applications Conference, December 5-9, 2005, Tucson, Arizona.
[18]
ASN Chakravarthy, P S Avadhani,“A Probabilistic Approach For Authenticating Text Or Graphical
Passwords Using Back Propagation, IJCSNS International Journal Of Computer Science And
Network Security, VOL.11 No.5, May 2011.