Good Practice for Strong Passwords
暂无分享,去创建一个
Kevin Curran | Jonathan Doherty | Ayleen McCann | Gary Turkington | K. Curran | Jonathan Doherty | A. McCann | G. Turkington
[1] Joseph Bonneau,et al. The Password Thicket: Technical and Market Failures in Human Authentication on the Web , 2010, WEIS.
[2] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[3] Yoichi Seto. Development of personal authentication systems using fingerprint with smart cards and digital signature technologies , 2002, 7th International Conference on Control, Automation, Robotics and Vision, 2002. ICARCV 2002..
[4] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[5] Paul C. van Oorschot,et al. On countering online dictionary attacks with login histories and humans-in-the-loop , 2006, TSEC.
[6] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[7] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[8] Steven M. Bellovin. Security by Checklist , 2008, IEEE Security & Privacy Magazine.
[9] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.