共 46 条
[1]
[Anonymous], 2006, Inf. Syst. Secur., DOI DOI 10.1080/10658980601051318
[2]
[Anonymous], 2011, Technical Report
[3]
Wired versus wireless security: The Internet, WAP and iMode for e-commerce
[J].
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2001,
:296-306
[4]
Addressing Smartphone-based Multi-factor Authentication via Hardware-rooted Technologies
[J].
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017),
2017,
:1910-1914
[5]
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information
[J].
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017),
2017,
:16-27
[6]
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:553-567
[7]
Butler S., 2011, 2011 IEEE 27th International Conference on Software Maintenance, P93, DOI 10.1109/ICSM.2011.6080776
[8]
Carter Patrick., 2016, International Conference on Financial Cryptography and Data Security, P231
[9]
Crocker Steve, 1994, TECHNICAL REPORT