Author:
Dodson Ben,Sengupta Debangsu,Boneh Dan,Lam Monica S.
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. T.I.A.D.C. (ADC). Consumer password worst practices (2009),
http://www.imperva.com/download.asp?id=239
2. Aloul, F., Zahidi, S.: Two factor authentication using mobile phones. In: Proceedings of the IEEE International Conference on Computer Systems and Applications, pp. 641–644 (2009)
3. Balakrishnan, M., Mohomed, I., Ramasubramanian, V.: Where’s that phone?: geolocating IP addresses on 3G networks. In: Proceedings of the Internet Measurement Conference, pp. 294–300 (2009)
4. Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72–84 (1992)
5. Bump technologies,
http://bumptechnologies.com
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献