共 26 条
[1]
News Search and Analytics, (2017)
[2]
(2017)
[3]
Feruza Y.S., Kim T., IT security review: privacy, protection, access control, assurance and system security, Int J Multimed Ubiquitous Eng, 2, 2, pp. 17-31, (2007)
[4]
Wikipedia [Online]., (2017)
[5]
Bridges K., Illustrated Dictionary of Information System Management, (2006)
[6]
Techtarget [Online], (2017)
[7]
Patel D.R., Information security: theory and practice, (2008)
[8]
Alsulaiman A.F., Saddik A.E., Three-dimensional password for more secure authentication, IEEE Trans Instrum Meas, 57, 9, pp. 1929-1938, (2008)
[9]
Waern Y., McDonald S., Cockton G., People and computers XIV—usability or else!, Proceedings of HCI, (2000)
[10]
Corn T.S., Juels A., Triandopoulos N., Methods and Apparatus for Knowledge-Based Authentication Using Historically-Aware Questionnaires, (2015)