Understanding environmental influences on performing password-based mobile authentication
暂无分享,去创建一个
[1] Lujo Bauer,et al. Of passwords and people: measuring the effect of password-composition policies , 2011, CHI.
[2] Lujo Bauer,et al. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] M. Angela Sasse,et al. Studying Password Use in the Wild: Practical Problems and Possible Solutions , 2010, SOUPS 2010.
[4] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[5] Jason I. Hong,et al. A diary study of password usage in daily life , 2011, CHI.
[6] Ray A. Perlner,et al. Electronic Authentication Guideline , 2014 .
[7] Peter J. Denning,et al. The internet worm , 1991 .
[8] Eugene H. Spafford,et al. The Internet Worm Incident , 1989, ESEC.