共 50 条
- [1] Selecting secure passwords [J]. Topics in Cryptology - CT-RSA 2007, Proceedings, 2007, 4377 : 49 - 66
- [2] Constructing secure and memorable passwords [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (05) : 701 - 717
- [3] GENERATION OF SECURE PASSWORDS BY THE USER [J]. IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 518 - 524
- [4] Can Long Passwords Be Secure and Usable? [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2927 - 2936
- [5] Secure Human Authentication with Graphical Passwords [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1247 - 1259
- [6] Sesame: A Secure and Convenient Mobile Solution for Passwords [J]. 2015 1ST CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2015, : 36 - 40
- [7] A Protocol of Quantum Authentication with Secure Quantum Passwords [J]. QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING (QCMC), 2009, 1110 : 388 - +
- [8] Graphical Passwords: Requisite for Secure Information Systems [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (10) : 2809 - 2813
- [9] Secure User Authentication with Graphical Passwords and PassText [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
- [10] Do You Think Your Passwords Are Secure? [J]. 2014 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS), 2014,