Author:
Gjøsteen Kristian,Thuen Øystein
Publisher
Springer Berlin Heidelberg
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Shared-Custodial Password-Authenticated Deterministic Wallets;Lecture Notes in Computer Science;2024
2. Automated Analysis of Cryptographic Assumptions in Generic Group Models;Journal of Cryptology;2018-12-18
3. PASTA;Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security;2018-01-15
4. Virtual Smart Cards: How to Sign with a Password and a Server;Lecture Notes in Computer Science;2016
5. On the Implications of Zipf’s Law in Passwords;Computer Security – ESORICS 2016;2016