Volume 13 | Number 1 | Year 2014 | Article Id. IJMTT-V13P505 | DOI : https://doi.org/10.14445/22315373/IJMTT-V13P505
Gurusharan Kaur, Dr. Rizwana Jamal, "Authenticate Communication with Adjacency Matrix using OTP(One Time Transaction) Method," International Journal of Mathematics Trends and Technology (IJMTT), vol. 13, no. 1, pp. 30-33, 2014. Crossref, https://doi.org/10.14445/22315373/IJMTT-V13P505
[1] A Survey on Recognition-Based Graphical User Authentication Algorithms
[2] Authentication Using Graphical Passwords: Basic Results Susan Wiedenbeck Jim Waters ,College of IST Drexel University Philadelphia, PA, 19104 USA
[3] Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice Susan Wiedenbeck Jim Waters College of IST Drexel University Philadelphia
[4] Graphical Passwords, FABIAN MONROSE AND MICHAEL K. REITER, August 5, 2005 [5] N. Koblitz, “ Elliptic Curve Cryptosystems ”, Mathematics of Computation, vol. 48, pp. 203- 209, January 1987.
[6] Secure Storage and Access of Data in Cloud Computing Arjun Kumar , Byung Gook Lee, HoonJae Lee, Anu Kumari, ©2012 IEEE
[7] Security Analysis of Graphical Passwords over the Alphanumeric Passwords by G. Agarwal ,1Deptt.of Computer Science, IIET, Bareilly, India 2,3 Deptt. of Information Technology, IIET, Bareilly, India 27-11-2010
[8] V. Miller. “Uses of Elliptic Curves in cryptography”. RYPT’85, LNCS 218, pp 417-426, 1986.
[9] W. Stallings. Cryptography and Network Security: Principles and Practice. (3rd ed.). Prentice Hall, Upper Saddle River, New Jersey, 2003,
[10] Wassim Itani Ayman Kayssi Ali Chehab, “Privacy as a Service:Privacy-Aware Data Storage and Processing in Cloud Computing Architectures”, Eighth IEEE International Conference on Dependable, 2009.