Publisher
Springer International Publishing
Reference63 articles.
1. M. Abadi, T. M. A. Lomas, and R. Needham. Strengthening passwords. SRC Technical Note 1997-033,
DEC Systems Research Center, Palo Alto, CA, 1997. September 4 with minor revision December 16.
2. L. Ballard, S. Kamara, F. Monrose, and M. K. Reiter. Towards practical biometric key generation with
randomized biometric templates. In ACM Comp. & Comm. Security (CCS), pages 235–244, 2008.
3. L. Ballard, F. Monrose, and D. P. Lopresti. Biometric authentication revisited: Understanding the
impact of wolves in sheep’s clothing. In USENIX Security, 2006.
4. R. Biddle, S. Chiasson, and P. C. van Oorschot. Graphical passwords: Learning from the first twelve
years. ACM Computing Surveys, 44(4):19:1–19:41, 2012.
5. A. Biryukov, D. Dinu, and D. Khovratovich. Argon2: New generation of memory-hard functions for
password hashing and other applications. In IEEE Eur. Symp. Security & Privacy, pages 292–302,
2016.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Usable Identity and Access Management Schemes for Smart Cities;Collaborative Approaches for Cyber Security in Cyber-Physical Systems;2023