共 50 条
- [31] A Secured Authentication Protocol Which Resist Password Reuse Attack 2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
- [32] A Method of Password Attack Based on Structure Partition and String Reorganization Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 913 - 928
- [33] Exploring Implicit Memory for Painless Password Recovery 29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2011, : 2615 - 2618
- [34] Extended password key exchange protocols immune to dictionary attack SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 248 - 255
- [35] Extended password key exchange protocols immune to dictionary attack J Eng Appl Sci, (248-255):
- [37] Password Recovery Mechanism Based on Keystroke Dynamics INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 245 - 257
- [38] Password Recovery for RAR Files Using CUDA EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 486 - +
- [39] UNVEILLING THE PASSWORD ENCRYPTION PROCESS UNDER WINDOWS A PRACTICAL ATTACK PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2013, 14 : 317 - 327
- [40] Repeating Toast Drawing Based Password Inference Attack Technique Ruan Jian Xue Bao/Journal of Software, 2022, 33 (06): : 2047 - 2060