Computer Science ›› 2020, Vol. 47 ›› Issue (11): 42-47.doi: 10.11896/jsjkx.200500144
Special Issue: Intelligent Mobile Authentication
• Intelligent Mobile Authentication • Previous Articles Next Articles
DONG Qi-ying, SHAN Xuan, JIA Chun-fu
CLC Number:
[1] BONNEAU J,HERLEY C,VAN O P C,et al.The quest to replace passwords:A framework for comparative evaluation of web authentication schemes [C]//2012 IEEE Symposium on Security and Privacy.IEEE,2012:553-567. [2] GJØSTEEN K,THUEN Ø.Password-based signatures [C]//European Public Key Infrastructure Workshop.Springer,2011:17-33. [3] JARECKI S,KIAYIAS A,KRAWCZYK H,et al.Highly-efficient and composable password-protected secret sharing (or:how to protect your bitcoin wallet online) [C]//2016 IEEE European Symposium on Security and Privacy (EuroS&P).2016:276-291. [4] CASTELLUCCIA C,DÜRMUTH M,PERITO D.AdaptivePassword-Strength Meters from Markov Models [C]//NDSS.2012. [5] SCHECHTER S,HERLEY C,MITZENMACH-ER M.Popu-larity is everything:A new approach to protecting passwords from statistical-guessing attacks [C]//Proceedings of the 5th USENIX Conference on Hot Topics in Security.USENIX Association,2010:1-8. [6] NEWMAN M E J.Power laws,Pareto distributions and Zipf's law [J].Contemporary Physics,2005,46(5):323-351. [7] WANG D,CHENG H,WANG P,et al.Zipf's law in passwords[J].IEEE Transactions on Information Forensics and Security,2017,12(11):2776-2791. [8] KATZ J,OSTROVSKY R,YUNG M.Effi cient and secure authenticated key exchange using weak passwords [J].Journal of the ACM(JACM),2009,57(1):1-39. [9] BAGHERZANDI A,JARECKI S,SAXENA N,et al.Password-protected secret sharing [C]//Proceedings of the 18th ACM conference on Computer and Communications Security,2011:433-444. [10] JARECKI S,KIAYIAS A,KRAWCYZK H.Round-optimalpassword-protected secret sharing and T-PAKE in the password-only model [C]//International Conference on the Theory and Application of Cryptology and Information Security.Springer,2014:233-253. [11] WANG D,WANG P.On the implications of Zipf's law in passwords[C]//European Symposium On Research in Computer Security.Springer,2016:111-131. [12] WANG D,WANG P.Two birds with one stone:Two-factor authentication with security beyond conventional bound [J].IEEE Transactions on Dependable and Secure Computing,2016,15(4):708-722. [13] JUELS A,RIVEST R L.Honeywords:Making password-crac-king detectable [C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security.2013:145-160. [14] SHAMIR A.How to share a secret [J].Communications of the ACM,1979,22(11):612-613. |
[1] | WANG Ran-ran, WANG Yong, CAI Yu-tong, JIANG Zheng-tao, DAI Gui-ping. Formal Verification of Yahalom Protocol Based on Process Algebra [J]. Computer Science, 2021, 48(6A): 481-484. |
[2] | GAN Yong, WANG Kai, HE Lei. Ownership Transfer Protocol for Multi-owners Internal Weight Changes with Trusted Third Party [J]. Computer Science, 2019, 46(6A): 370-374. |
[3] | ZHANG Guang-hua, LIU Hui-meng, CHEN Zhen-guo. Attribute-based Revocation Scheme in Cloud Computing Environment [J]. Computer Science, 2018, 45(8): 134-140. |
[4] | JIN Yu, CAI Chao, HE Heng and LI Peng. BTDA:Dynamic Cloud Data Updating Audit Scheme Based on Semi-trusted Third Party [J]. Computer Science, 2018, 45(3): 144-150. |
[5] | LI Lei, JIA Hui-wen, BAN Xue-hua and HE Yu-fan. Obfuscation-based Broadcasting Multi-signature Scheme [J]. Computer Science, 2017, 44(Z11): 329-333. |
[6] | WANG Pei-xue and ZHOU Hua-qiang. Research on Cloud Security Model Based on Trusted Third Party on Multi-tenant Environment [J]. Computer Science, 2014, 41(Z6): 363-365. |
[7] | WANG Yong-tao,FENG Wei-duan,LIU Xiao-nan,SONG Jing and GUO Zhen-zhou. Message Policy Attribute Based Key Agreement Protocol [J]. Computer Science, 2013, 40(9): 106-110. |
[8] | . Novel Revocable Short Group Signatures Scheme without Encryption [J]. Computer Science, 2012, 39(4): 41-45. |
[9] | LI Yan-Ping, SI Guang-Dong ,WANG Yu-Min (State Key Lab of Intergrated Service Network, Xidian University, Xi'an 710071). [J]. Computer Science, 2006, 33(8): 95-97. |
|