Implementing Strong Authentication Interoperability with Legacy Systems
暂无分享,去创建一个
[1] M. Angela Sasse,et al. Making Passwords Secure and Usable , 1997, BCS HCI.
[2] N. Economides. The Economics of Networks , 1995 .
[3] A. Karp. Site-Specific Passwords , 2003 .
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Yossi Matias,et al. How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.
[6] Brent Waters,et al. A convenient method for securely managing passwords , 2005, WWW '05.
[7] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[8] R. A. Sibley,et al. The SLANG system , 1961, CACM.
[9] Bart Preneel,et al. Introduction to the Belgian EID Card: BELPIC , 2004, EuroPKI.
[10] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[11] Rolf Oppliger,et al. Why have public key infrastructures failed so far? , 2005, Internet Res..
[12] Dan Boneh,et al. Proceedings of the 11th USENIX Security Symposium , 2002 .