共 24 条
[1]
Andrabi S.J., 2015, 11 S USABLE PRIVACY, P89
[2]
[Anonymous], 2017, OPEN SOURCE COMPUTER
[3]
[Anonymous], NDSS
[4]
Aviv AJ., 2010, P 4 USENIX C OFF TEC, V10, P1
[5]
Berger Y., 2006, CCS '06, P245
[6]
Argon2: new generation of memory-hard functions for password hashing and other applications
[J].
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY,
2016,
:292-302
[7]
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:553-567
[8]
Chow Y. W., 2014, INT C INF COMM SEC INT C INF COMM SEC, P243
[9]
Fleischhacker N., 2012, 2012181 CRYPT EPRINT
[10]
Forte Andrea G., 2014, Security and Cryptography for Networks. 9th International Conference (SCN 2014). Proceedings: LNCS 8642, P255, DOI 10.1007/978-3-319-10879-7_15