参考文章(248)
Thomas D. Wu, A Real-World Analysis of Kerberos Password Security. network and distributed system security symposium. ,(1999)
Hyoungshick Kim, John Tang, Ross Anderson, Social Authentication: Harder Than It Looks financial cryptography. pp. 1- 15 ,(2012) , 10.1007/978-3-642-32946-3_1
U. Ultes-Nitsche, C. Latze, Stronger authentication in e-commerce: how to protect even naïve user against phishing, pharming, and MITM attacks communication systems and networks. pp. 111- 116 ,(2007)
William Cheswick, Johnny can obfuscate: beyond mother's maiden name usenix conference on hot topics in security. pp. 6- 6 ,(2006)
Eugene H. Spafford, Observations on reusable password choices usenix security symposium. ,(1992)
M. Gasser, A Random Word Generator for Pronounceable Passwords Defense Technical Information Center. ,(1975) , 10.21236/ADA017676
Sacha Brostoff, M Angela Sasse, Are Passfaces More Usable Than Passwords? A Field Trial Investigation People and Computers XIV — Usability or Else!. pp. 405- 424 ,(2000) , 10.1007/978-1-4471-0515-2_27
Philip Heng Wai Leong, C. Tham, UNIX Password Encryption Considered Insecure. USENIX Winter. pp. 269- 280 ,(1991)