The domino effect of password reuse
暂无分享,去创建一个
[1] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[2] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[3] Anne Adams,et al. The User is not the enemy , 2005 .
[4] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[5] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[6] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .