How to Set and Manage Your Network Password: A Multidimensional Scheme of Password Reuse
暂无分享,去创建一个
[1] Benny Pinkas,et al. Securing passwords against dictionary attacks , 2002, CCS '02.
[2] M. Geetha,et al. OPass: Attractive Presentation of User Authentication Protocol with Resist to Password Reuse Attacks , 2013 .
[3] Clark D. Thomborson,et al. Passwords and Perceptions , 2009, AISC.
[4] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[5] J E Lisman,et al. Storage of 7 +/- 2 short-term memories in oscillatory subcycles , 1995, Science.
[6] Juan Ruiz-Alzola,et al. Biometric identification systems , 2003, Signal Process..
[7] Cheng Yang,et al. An analysis view on password patterns of Chinese internet users , 2013 .
[8] Jae-Hyeon Ahn,et al. Improving information security management: An analysis of ID-password usage and a new login vulnerability measure , 2012, Int. J. Inf. Manag..
[9] Edward W. Felten,et al. Password management strategies for online accounts , 2006, SOUPS '06.
[10] Alan S. Brown,et al. Generating and remembering passwords , 2004 .
[11] Xin Luo,et al. Improving multiple-password recall: an empirical study , 2009, Eur. J. Inf. Syst..
[12] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[13] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[14] Brent Waters,et al. A convenient method for securely managing passwords , 2005, WWW '05.