共 11 条
[1]
BURNETT M, 2006, PERFECT PASSWORDS, P181
[2]
GARRISON CP, 2008, LINE CPA J MAY
[3]
Hoffman L., 1977, Modern methods for computer security and privacy
[4]
Klein D., 1990, UN SEC WORKSH 2 USEN
[5]
Renaud K, 2005, EVALUATING AUTHENTIC, P103
[6]
Soh B, 2003, IEEE/WIC INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, PROCEEDINGS, P413
[7]
Stallings W., 2000, Network security essentials : applications and standards
[8]
Yan J., 2005, SECURITY USABILITY D, P129
[9]
[No title captured]
[10]
[No title captured]