共 28 条
[1]
[Anonymous], 2009, Consumer Communications and Networking Conference, DOI DOI 10.1109/CCNC.2009.4784783
[2]
[Anonymous], 2008, AUSTR INF SEC MAN C, DOI DOI 10.4225/75/57B55A56B876A
[3]
[Anonymous], 2009, Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
[4]
Aviv AJ, 2010, P WOOT
[5]
BONASTRE JF, 2003, P EUR
[6]
Bonneau J, 2012, P FIN CRYPT
[7]
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:553-567
[8]
Bonneau Joseph, 2010, WORKSH EC INF SEC WE
[9]
Briggs Pamela., 2008, CHI'08 Extended Abstracts on Human Factors in Computing Systems, P2423
[10]
Canalys, SMART PHON OV CLIENT