Recognition based authentication method to prevent reconstruction attack
| Main Author: | |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/3042/ http://eprints.utar.edu.my/3042/1/fyp_CS_2018_KCJ_%2D_1507646.pdf |
| _version_ | 1848885809148592128 |
|---|---|
| author | Koay, Chong Jen |
| author_facet | Koay, Chong Jen |
| author_sort | Koay, Chong Jen |
| building | UTAR Institutional Repository |
| collection | Online Access |
| first_indexed | 2025-11-15T19:28:30Z |
| format | Final Year Project / Dissertation / Thesis |
| id | utar-3042 |
| institution | Universiti Tunku Abdul Rahman |
| institution_category | Local University |
| last_indexed | 2025-11-15T19:28:30Z |
| publishDate | 2018 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | utar-30422019-04-12T11:20:03Z Recognition based authentication method to prevent reconstruction attack Koay, Chong Jen QA76 Computer software T Technology (General) 2018-08-29 Final Year Project / Dissertation / Thesis NonPeerReviewed application/pdf http://eprints.utar.edu.my/3042/1/fyp_CS_2018_KCJ_%2D_1507646.pdf Koay, Chong Jen (2018) Recognition based authentication method to prevent reconstruction attack. Final Year Project, UTAR. http://eprints.utar.edu.my/3042/ |
| spellingShingle | QA76 Computer software T Technology (General) Koay, Chong Jen Recognition based authentication method to prevent reconstruction attack |
| title | Recognition based authentication method to prevent reconstruction attack |
| title_full | Recognition based authentication method to prevent reconstruction attack |
| title_fullStr | Recognition based authentication method to prevent reconstruction attack |
| title_full_unstemmed | Recognition based authentication method to prevent reconstruction attack |
| title_short | Recognition based authentication method to prevent reconstruction attack |
| title_sort | recognition based authentication method to prevent reconstruction attack |
| topic | QA76 Computer software T Technology (General) |
| url | http://eprints.utar.edu.my/3042/ http://eprints.utar.edu.my/3042/1/fyp_CS_2018_KCJ_%2D_1507646.pdf |