共 14 条
[1]
Adida B, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P48
[2]
[Anonymous], 2006, P SIGCHI C HUM FACT, DOI 10.1145/1124772.1124861
[3]
Boyle M., 2011, P 9 ANN INT C MOB SY, P395
[4]
Dhamija R., 2000, P C USENIX SEC S, V9, P4
[7]
Jakobsson Markus., 2008, Proceedings of the 4th ACMworkshop on Digital identity management, DIM '08, P61, DOI [10.1145/1456424.1456435, DOI 10.1145/1456424.1456435]
[8]
Karlof C.S., 2009, P 5 S US PRIV SEC SO, p[38, 1]
[9]
Margulies R., 2011, THESIS BAR ILAN U
[10]
It's no secret Measuring the security and reliability of authentication via 'secret' questions
[J].
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2009,
:375-390