Design and Implementation of Challenge Response Protocol for Enhanced e-Commerce Security
暂无分享,去创建一个
[1] A. W. Roscoe,et al. Usability and security of out-of-band channels in secure device pairing protocols , 2009, SOUPS.
[2] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[3] Patrick Traynor,et al. One-time cookies: Preventing session hijacking attacks with stateless authentication tokens , 2012, TOIT.
[4] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[5] Edward F. Gehringer. Choosing passwords: security and human factors , 2002, IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293).
[6] Cullen Jennings,et al. Certificate Management Service for the Session Initiation Protocol (SIP) , 2011, RFC.
[7] Bruce Schneier,et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists , 1996 .
[8] Edward W. Felten,et al. Password management strategies for online accounts , 2006, SOUPS '06.
[9] Arati Baliga,et al. Rootkits on smart phones: attacks, implications and opportunities , 2010, HotMobile '10.
[10] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.