Now showing items 1-1 of 1

  • USING SMARTPHONE TO PREVENT KEYLOGGING AND SHOULDER SURFING 

    Ali, Rahil Karim
    Intruders have developed many methods to obtain sensitive information- some of the information is private and confidential such as username and password. Although strong cryptographic algorithms and authentication schemes ...