Funder
Center for Identification Technology Research
National Science Foundation
NYSTAR Technology Transfer program
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Bonneau J, Herley C, Van Oorschot PC, Stajano F. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy, 2012; 553–567. IEEE
2. Gemalto Inc: Analysis: Data breaches compromised 4.5bn records in half year 2018. https://thecitizenng.com/analysis-data-breaches-compromised-4-5bn-records-in-half-year-2018-gemalto/. Accessed: 2019-09-20, 2018;
3. Song V. Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords. https://gizmodo.com/mother-of-all-breaches-exposes-773-million-emails-21-m-1831833456. Accessed: 2019-09-20
4. Wahab AA, Hou D, Schuckers S, Barbir A. Utilizing keystroke dynamics as additional security measure to protect account recovery mechanism. In: ICISSP, 2021;33–42
5. owasp.org: Credential stuffing. https://owasp.org/ www-community/ attacks/Credential_stuffing. Accessed: 2020-04-03, 2020
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献