Easily remembered passphrases: a better approach
暂无分享,去创建一个
[1] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[2] Sig Porter,et al. A password extension for improved human factors , 1982, Comput. Secur..
[3] Judith Spencer Reitman. 5 – Computer Simulation of an Information-Processing Model of Short-Term Memory , 1970 .
[4] Maurice V. Wilkes,et al. Time-sharing computer systems , 1968 .
[5] Helen Marie Wood,et al. The use of passwords for controlled access to computer resources. , 1977 .
[6] Gloria R. Bolotsky,et al. Considerations in the Selection of Security Measures for Automatic Data Processing Systems | NIST , 1978 .
[7] H. Winitz,et al. Long-Term Recall of Speech Sounds as a Function of Pronounceability , 1975, Language and speech.
[8] M Gasser,et al. A Random Word Generator for Pronounceable Passwords , 1975 .
[9] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[10] Charles Cresson Wood. Effective information system security with password controls , 1983, Comput. Secur..
[11] James A. Haskett,et al. Pass-algorithms: a user validation scheme based on knowledge of secret algorithms , 1984, CACM.
[12] James A. Schweitzer. Computer Security: Make Your Passwords More Effective , 1983 .