Journal articles on the topic 'Click-points'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Click-points.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
KumarSarohi, Harsh, and Farhat Ullah Khan. "Perception based Cued Click Points." International Journal of Computer Applications 70, no. 22 (2013): 29–33. http://dx.doi.org/10.5120/12201-8381.
Full textNandgaonkar, Mr Vikas, Nikita Dongre, and Priyanka Giri Diksha Hinge Ankita Kashid. "QR Code Based Secure Billing System for Shops using Cued Click Points." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 834–36. http://dx.doi.org/10.31142/ijtsrd23946.
Full textMhetre, Miss Deepika, Miss Komal Murkute, Miss Vishranti Kale,, Miss Apurva Kabra, and Prof Sonali Madankar. "M-Wallet Security using Cued Click Points." IOSR Journal of Computer Engineering 16, no. 2 (2014): 63–69. http://dx.doi.org/10.9790/0661-162106369.
Full textHorner, Bob. "Policy Points: Communication is a Click Away." Lighting Design + Application 41, no. 1 (2011): 30–31. https://doi.org/10.1177/036063251104100109.
Full textKiran, T. Ravi, P. Varaha Mounika, S. V. Vasavi Swapna, S. Satya Rao, and N. Raju. "Secure Password Authentication Approach using Cued Click Points." International Journal of Engineering Trends and Technology 10, no. 10 (2014): 478–81. http://dx.doi.org/10.14445/22315381/ijett-v10p292.
Full textAmeen, J. Noorul, J. Jamal Mohamed, and N. Nilofer Begam. "Efficient Authentication Scheme Using PCCP." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 938–51. https://doi.org/10.5281/zenodo.14742817.
Full textSaha, Hasi, Ganesh Chandra Saha, Roshidul H, and Zakirul Islsam. "USER AUTHENTICATION THROUGH CUED CLICK POINTS BASED GRAPHICAL PASSWORD." American Journal of Agricultural Science, Engineering, and Technology 3, no. 1 (2017): 1–12. http://dx.doi.org/10.54536/ajaset.v3i1.38.
Full textZhao, Yibo, Yanan Liu, Songzuo Liu, Gang Qiao, and Xin Qing. "Detecting and suppressing dolphin clicks in whistle signals using adaptive matched filtering and interpolation algorithm." Journal of the Acoustical Society of America 157, no. 6 (2025): 4057–68. https://doi.org/10.1121/10.0036828.
Full textN, Narayanan Prasanth, Azarudeen K, Gulam Ahamed Kabeer M, and Gulam Peer Mohamed J. "Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points." i-manager's Journal on Software Engineering 8, no. 3 (2014): 26–30. http://dx.doi.org/10.26634/jse.8.3.2809.
Full textSahu, Saraswati B., and Angad Singh. "Secure User Authentication & Graphical Password using Cued Click-Points." International Journal of Computer Trends and Technology 18, no. 4 (2014): 156–60. http://dx.doi.org/10.14445/22312803/ijctt-v18p137.
Full textHassan Zali, Yakubu, Gregory Maksha Wajiga, Abubakar Abdullahi Faru, Yusuf Musa Malgwi, and Adamu Liman Mohammed. "Enhancing Data Warehouse Security: An Encrypted Cued-Click-Points Authentication Approach." International Journal of Development Mathematics (IJDM) 1, no. 3 (2024): 186–95. http://dx.doi.org/10.62054/ijdm/0103.14.
Full textNorthcott, Celine, Rachel Curtis, Svetlana Bogomolova, et al. "Seasonal Differences in the Cost and Engagement of Facebook Advertisements for a Physical Activity Smartphone App." American Journal of Health Promotion 35, no. 6 (2021): 803–8. http://dx.doi.org/10.1177/0890117121997304.
Full textSrinivas, Devi. "Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points." IOSR Journal of Computer Engineering 12, no. 2 (2013): 39–46. http://dx.doi.org/10.9790/0661-1223946.
Full textAshok, P. "Dynamic Cryptographic Algorithm to Provide Password Authentication using Cued Click Points." International Journal of Informatics and Communication Technology (IJ-ICT) 6, no. 2 (2017): 123. http://dx.doi.org/10.11591/ijict.v6i2.pp123-128.
Full textNayak, Atish Dipakbhai, and Rajesh Bansode. "Performance analysis and evaluation of secure password persuasive cued click points." International Journal of Pervasive Computing and Communications 12, no. 4 (2016): 408–20. http://dx.doi.org/10.1108/ijpcc-07-2016-0040.
Full textNayak, Atish, and Rajesh Bansode. "Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points." Procedia Computer Science 79 (2016): 553–60. http://dx.doi.org/10.1016/j.procs.2016.03.070.
Full textLi, Shang, Mi Gu, Sara Garzandat, Xiao Wei Sun, and Renaud Bachelot. "8‐2: The micro‐scale adsorption of QDs on select surface by click chemistry." SID Symposium Digest of Technical Papers 55, S1 (2024): 80–82. http://dx.doi.org/10.1002/sdtp.17001.
Full textGopalakrishnan, Adithya, Anugraha K Anil, Anu Thomas, Devika Vijayan ,, and Mafnitha K K. "Graphical Password Authentication: Strengthening Security in the Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43155.
Full textAbhishek, Narayan Shah, Anand Dipti, Samanta Sabyasachi, and Dey Dipankar. "Graphical Password Authentication System Using Modified Intuitive Approach." International Journal of HIT Transaction on ECCN Vol. 7, no. 2A (2021) (2021): 64–71. https://doi.org/10.5281/zenodo.5893206.
Full textLakshmi, Y. Sravana. "Evaluation of a Knowledge Based Authentication Mechanism through Persuasive Cued Click Points." International Journal of Computer Applications Technology and Research 4, no. 9 (2015): 633–39. http://dx.doi.org/10.7753/ijcatr0409.1001.
Full textMr., Vikas Nandgaonkar, Dongre Nikita, and Giri |. Diksha Hinge |. Ankita Kashid Priyanka. "QR Code Based Secure Billing System for Shops using Cued Click Points." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 834–36. https://doi.org/10.31142/ijtsrd23946.
Full textAnitha, M., and G. Saranya. "User Privileged CAPTCHA as Graphical Password for Multistage Authentication." International Journal of Advance Research and Innovation 3, no. 1 (2015): 28–33. http://dx.doi.org/10.51976/ijari.311505.
Full textHande, Suraj, Nitin Dighade, Ruchal Bhusari, Mrunali Shende, and Prof Heena Agrawal. "Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA." IOSR Journal of Computer Engineering 16, no. 2 (2014): 124–28. http://dx.doi.org/10.9790/0661-1629124128.
Full textRangari, Mr Shantanu, and Prof K. R. Ingole. "Implementation of Graphical Password Authentication Technique for Security Using Cued Click Points Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1476–79. http://dx.doi.org/10.22214/ijraset.2022.41416.
Full textGore, Ruta. "Graphical Based Authentication System Using Keystroke Parameters and Cued Click- Points: A Survey." International Journal for Research in Applied Science and Engineering Technology 7, no. 1 (2019): 843–44. http://dx.doi.org/10.22214/ijraset.2019.1133.
Full textBalalaie, Saeed, Aref Vaezghaemi, Nahid Zarezadeh, Frank Rominger, and Hamid Bijanzadeh. "Catalyst-Free Synthesis of Fused Triazolo-Diazepino[5,6-b]Quinoline Derivatives via a Sequential Ugi-4CR–Nucleophilic Substitution–Intramolecular Click Reaction." Synlett 29, no. 08 (2018): 1095–101. http://dx.doi.org/10.1055/s-0036-1591531.
Full textMüller, Katharina, Frank Schmitz, Alfons Schnitzler, Hans-Joachim Freund, Gisa Aschersleben, and Wolfgang Prinz. "Neuromagnetic Correlates of Sensorimotor Synchronization." Journal of Cognitive Neuroscience 12, no. 4 (2000): 546–55. http://dx.doi.org/10.1162/089892900562282.
Full textCastrillón-López, Wilson, Andrés F. Yepes, and Wilson Cardona-Galeano. "Synthesis and In Silico Drug-Likeness Modeling of 5-FU/ASA Hybrids." Molbank 2023, no. 4 (2023): M1745. http://dx.doi.org/10.3390/m1745.
Full textAbuthaheer, A., N. S. Jeya Karthikka, and T. M. Thiyagu. "Cued Click Points Graphical Images and Text Password along with Pixel based OTP Authentication." International Journal of Computer Applications 87, no. 2 (2014): 45–49. http://dx.doi.org/10.5120/15184-3535.
Full textChiasson, Sonia, Elizabeth Stobert, Alain Forget, Robert Biddle, and Paul C. Van Oorschot. "Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism." IEEE Transactions on Dependable and Secure Computing 9, no. 2 (2012): 222–35. http://dx.doi.org/10.1109/tdsc.2011.55.
Full textClara, García-Astrain, Munduate Kizkitza González, Gurrea Tania, et al. "Maleimide-grafted cellulose nanocrystals as cross-linkers for bionanocomposite hydrogels." Carbohydrate Polymers 149, no. 20 (2016): 94–101. https://doi.org/10.1016/j.carbpol.2016.04.091.
Full textEmmanuel, T. M., S. U. Suru, and B. T. Shehu. "Graphical Password Scheme Based on Color Hint Approach." International Journal of Research and Scientific Innovation XI, no. I (2024): 128–40. http://dx.doi.org/10.51244/ijrsi.2024.1101011.
Full textOrie, Ọlanikẹ Ọla. "Pointing the Yoruba way." Gesture 9, no. 2 (2009): 237–61. http://dx.doi.org/10.1075/gest.9.2.04ori.
Full textCollins, Rebecca A., Lee M. Ashton, Tracy L. Burrows, et al. "No Money No Time Culinary Nutrition Website eHealth Challenge: A Pre-Post Evaluation of Impact on Diet Quality, Food Expenditure, and Engagement." Nutrients 16, no. 17 (2024): 2950. http://dx.doi.org/10.3390/nu16172950.
Full textMartínez, Isabel Cecilia. "Music attending to linear constituent structures in tonal music." Music & Science 1 (January 1, 2018): 205920431878776. http://dx.doi.org/10.1177/2059204318787763.
Full textMiravalle, Augusto A., Joshua Katz, Derrick Robertson, et al. "CLICK-MS and MASTER-2 Phase IV trial design: cladribine tablets in suboptimally controlled relapsing multiple sclerosis." Neurodegenerative Disease Management 11, no. 2 (2021): 99–111. http://dx.doi.org/10.2217/nmt-2020-0059.
Full textAzcarraga, Judith, and Merlin Teodosia Suarez. "Recognizing Student Emotions using Brainwaves and Mouse Behavior Data." International Journal of Distance Education Technologies 11, no. 2 (2013): 1–15. http://dx.doi.org/10.4018/jdet.2013040101.
Full textSOWMIYA, M., R. ACKSHAYA, MACREEN M. INFANT, and T. NIVETHA. "Secure Online Banking using Cued Click Point Graphical Password Algorithm." International Journal of Innovative Science and Research Technology 7, no. 6 (2022): 826–29. https://doi.org/10.5281/zenodo.6809051.
Full textAlves Gomes, Miguel, Richard Meyes, Philipp Meisen, and Tobias Meisen. "It’s Not Always about Wide and Deep Models: Click-Through Rate Prediction with a Customer Behavior-Embedding Representation." Journal of Theoretical and Applied Electronic Commerce Research 19, no. 1 (2024): 135–51. http://dx.doi.org/10.3390/jtaer19010008.
Full textBoehnke, Susan E., and Dennis P. Phillips. "Auditory Saltation in the Vertical Midsagittal Plane." Perception 34, no. 3 (2005): 371–77. http://dx.doi.org/10.1068/p5140.
Full textKeklik, Merve, Irem Akar, Binnur Aydogan Temel, Demet Karaca Balta, and Gokhan Temel. "Single‐chain polymer nanoparticles via click crosslinking and effect of photoinduced radical combination on crosslink points." Polymer International 69, no. 10 (2020): 1018–23. http://dx.doi.org/10.1002/pi.6057.
Full textMambu, Joe Yuan, Junior Lakat, and George Morris William Tangka. "Connecting Tutors and Students: A Mobile Application Designed with Design Thinking." CogITo Smart Journal 10, no. 2 (2024): 533–47. https://doi.org/10.31154/cogito.v10i2.814.533-547.
Full textPinotti, Paolo. "Clicking on Heaven’s Door: The Effect of Immigrant Legalization on Crime." American Economic Review 107, no. 1 (2017): 138–68. http://dx.doi.org/10.1257/aer.20150355.
Full textZhou, Xiaoyu. "Predicting Click Behavior Based on Machine Learning Models." BCP Business & Management 44 (April 27, 2023): 270–78. http://dx.doi.org/10.54691/bcpbm.v44i.4822.
Full textLapoule, Paul. "The French Grocery Retail Company Intermarché Develops the ‘Click and Drive’ Model." South Asian Journal of Business and Management Cases 3, no. 1 (2014): 65–76. http://dx.doi.org/10.1177/2277977914525294.
Full textTang, Bin, Xia Meng, Fuliang Zhang, et al. "Theoretical and practical investigation into the use of a bio-inspired “click” mechanism for the flight motor of a micro air vehicle." International Journal of Micro Air Vehicles 9, no. 2 (2017): 136–45. http://dx.doi.org/10.1177/1756829317695562.
Full textChaturvedi, Smita, and Rekha Sharma. "Securing Text & Image Password Using the Combinations of Persuasive Cued Click Points with Improved Advanced Encryption Standard." Procedia Computer Science 45 (2015): 418–27. http://dx.doi.org/10.1016/j.procs.2015.03.172.
Full textJiang, Xiu Hong, Fu Hai Duan, and Rui Guo. "Research on Multi-Point Calibration and Touch Pressure of Touch-Screen." Applied Mechanics and Materials 198-199 (September 2012): 1290–93. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.1290.
Full textHo, Yi-Jen (Ian), Sanjeev Dewan, and Yi-Chun (Chad) Ho. "Distance and Local Competition in Mobile Geofencing." Information Systems Research 31, no. 4 (2020): 1421–42. http://dx.doi.org/10.1287/isre.2020.0953.
Full textVikhe, B. B., and Shabbir Ahmad. "System Security Using 3-Dimensional Password." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 08 (2015): 1966–69. https://doi.org/10.5281/zenodo.14789611.
Full text