Publisher
Springer International Publishing
Reference17 articles.
1. Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
2. Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
3. Bonneau, J., Herley, C., Oorschot, P.C.V., et al.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: Security and Privacy, pp. 553–567. IEEE (2012)
4. M. Adeptus, Hashdumps and Passwords. http://www.adeptus-mechanicus.com/codex/hashpass/hashpass.php (2014)
5. Chang, C.C., Wu, T.C.: Remote password authentication with smart cards. IEE Proc. E – Comput. Digit. Techn. 138(3), 165–168 (2005)