Fourth-factor authentication: somebody you know
暂无分享,去创建一个
Moti Yung | Ronald L. Rivest | Ari Juels | Michael Szydlo | John G. Brainard | A. Juels | R. Rivest | M. Yung | M. Szydlo
[1] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[2] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[3] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[4] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[5] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[6] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[7] Markus Jakobsson,et al. Messin' with Texas Deriving Mother's Maiden Names Using Public Records , 2005, ACNS.
[8] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[9] Sun Meifeng,et al. KeyNote Trust Management System , 2002 .