Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices
暂无分享,去创建一个
Nitesh Saxena | Stanislaw Jarecki | Maliheh Shirvanian | Naveen Nathan | Nitesh Saxena | Maliheh Shirvanian | Stanislaw Jarecki | N. Nathan
[1] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[2] Mihir Bellare,et al. New Proofs for NMAC and HMAC: Security without Collision Resistance , 2006, Journal of Cryptology.
[3] Jeremy Clark,et al. Tapas: design, implementation, and usability evaluation of a password manager , 2012, ACSAC '12.
[4] Nitesh Saxena,et al. Exploring Mobile Proxies for Better Password Authentication , 2012, ICICS.
[5] Paul C. van Oorschot,et al. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer , 2007, Financial Cryptography.
[6] Srinivas Devadas,et al. The untrusted computer problem and camera based authentication using optical character recognition , 2002 .
[7] Dan S. Wallach,et al. Strengthening user authentication through opportunistic cryptographic identity assertions , 2012, CCS.
[8] Adrian Perrig,et al. Phoolproof Phishing Prevention , 2006, Financial Cryptography.
[9] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[10] Mihir Bellare,et al. New Proofs for NMAC and HMAC: Security without Collision Resistance , 2006, Journal of Cryptology.
[11] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.