参考文献
[1]Suo Xiaoyuan.A Design and Analysis of Graphical Password[J].Computer Science,2006,8(3):741-749.
[2]Jain A K,Ross A,Prabhakar S.An Introduction to Biometric Recognition[J].IEEE Transactions on Circuits and Systems for Video Technology,2004,14(1):4-20.
[3]Naor M,Shamir A.Visual Cryptography[C]//Proceedings of Eurocrypto′94.Berlin,Germany:Springer,1994:1-12.
[4]Ito K,Nakajima H,Kobayashi K,et al.A Fingerprint Matching Algorithm Using Phase-only Correlation[J].IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences,2004,87(3):682-691.
[5]Herley C,Oorschot P V.A Research Agenda Acknow-ledging the Persistence of Passwords[J].IEEE Security & Privacy Magazine,2012,10(1):28-36.
(下转第200页)
(上接第195页)
[6]李恺,张李军,刘义铭.PhpBB网络论坛的安全性分析[J].通信技术,2013,46(8):98-101.
[7]Wang Ding,Wang Ping.Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards[J].Information Security,2015,52:221-237.
[8]Houshmand S,Aggarwal S.Building Better Passwords Using Probabilistic Techniques[C]//Proceedings of the 28th Annual Computer Security Applications Conference.New York,USA:ACM Press,2012:109-118.
[9]Spafford E H.Preventing Weak Password Choices[J].Computers & Security,1992,11(3):273-278.
[10]Helkala K,Snekkenes E.Password Generation and Search Space Reduction[J].Journal of Computers,2009,4(7):663-669.
[11]Openwall.Bringing Security into Open Computing Environments[EB/OL].(2015-04-10).http://www.openwall.com/.
[12]Weir M,Aggarwal S,de Medeiros B,et al.Password Cracking Using Probabilistic Context-free Grammars[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2009:391-405.
[13]Narayanan A,Shmatikov V.Fast Dictionary Attacks on Passwords Using Time-space Tradeoff[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2005:364-372.
[14]Brown B J,Callis K.Computer Password Choice and Personality Traits Among College Students[D].Cape Girardeau,USA:Southeast Missouri State University,2004.
[15]Yampolskiy R V.Analyzing User Password Selection Behavior for Reduction of Password Space[C]//Proceedings of IEEE International Carnahan Conference on Security Technology.Washington D.C.,USA:IEEE Press,2006:109-115.
[16]Malone D,Maher K.Investigating the Distribution of Password Choices[J].Computer Science,2011,8(3):301-310.
[17]Li Zhigong,Han Weili,Xu Wenyuan.A Large-scale Empirical Analysis of Chinese Web Passwords[C]//Proceedings of the 23rd USENIX Security Symposium.San Diego,USA:USENIX,2014:559-574.
编辑顾逸斐
|