Author:
Yang Kunyu,Hu Xuexian,Zhang Qihui,Wei Jianghong,Liu Wenfen
Publisher
Springer International Publishing
Reference24 articles.
1. Camenisch, J., Lehmann, A., Neven, G.: Optimal distributed password verification. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 182–194 (2015)
2. Catuogno, L., Castiglione, A., Palmieri, F.: A honeypot system with honeyword-driven fake interactive sessions. In: Proceedings of the International Conference on High Performance Computing & Simulation, pp. 187–194 (2015)
3. Chakraborty, N., Mondal, S.: Few notes towards making honeyword system more secure and usable. In: Proceedings of the 8th International Conference on Security of Information and Networks, pp. 237–245 (2015)
4. Chakraborty, N., Mondal, S.: A new storage optimized honeyword generation approach for enhancing security and usability. CoRR abs/1509.06094 (2015). http://arxiv.org/abs/1509.06094
5. Chakraborty, N., Mondal, S.: On designing a modified-UI based honeyword generation approach for overcoming the existing limitations. Comput. Secur. 66, 155–168 (2017)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献