1. Florêncio, D., Herley, C.: Where do security policies come from? In: Proceedings of a Symposium on Usable Privacy and Security (SOUPS), pp. 1–14. ACM, Redmond (2010)
2. Grassi, P.A., Garcia, M.E., Fenton, J.L.: Digital Identity Guidelines. NIST Special Publication 800-63-3, pp. 1–62. NIST (2017)
3. Lecture Notes in Computer Science;D Wang,2015
4. de Carnavalet, X., Mannan, M.: From very weak to very strong: analyzing password-strength meters. In: NDSS, vol. 14, pp. 23–26 (2014)
5. AlFayyadh, B., Thorsheim, P., Jøsang, A., Klevjer, H.: Improving usability of password management with standardized password policies. In: Proceedings of the Seventh Conference on Network and Information Systems Security (SAR-SSI), pp. 7983–7999. Kolkata, India (2012)