Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Ellison, C., Hall, C., Milbert, R., Schneier, B.: Protecting secret keys with personal entropy. Future Gener. Comput. Syst. 16(4), 311–318 (2000)
2. Frykholm, N., Juels, A.: Error-tolerant password recovery. In: CCS 2001: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 1–9. ACM, New York (2001)
3. Just, M.: Designing and evaluating challenge-question systems. IEEE Security & Privacy (2004)
4. Rabkin, A.: Personal knowledge questions for fallback authentication: Security questions in the era of facebook. In: SOUPS: Symposium on Usable Privacy and Security (2006)
5. Lecture Notes in Computer Science;V. Griffith,2005