1. Aloul, F., Zahidi, S., El-Hajj, W.: In: IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, pp. 641–644 (2009)
2. Adida, B.: In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 48–57. ACM, New York (2007),
http://doi.acm.org/10.1145/1315245.1315253
, doi:10.1145/1315245.1315253
3. Lastpass (2013),
https://lastpass.com/
4. Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: In: Proceedings of the 14th Conference on USENIX Security Symposium, SSYM 2005, vol. 14, p. 2. USENIX Association, Berkeley (2005),
http://dl.acm.org/citation.cfm?id=1251398.1251400
5. Lecture Notes in Computer Science;M. Pala,2011