Emigh A. Online identity theft: phishing technology, chokepoints and countermeasures[Z]. : Radix Labs, 2005.
[2]
Yan J, Blackwell A, Anderson R, et al. The memorability and security of passwords-some empirical results[Z]. : University of Cambridge Computer Laboratory, 2000.
[3]
Hamilton S S, Carlisle M C, Hamilton J A. A global look at authentication//IWA'07. New York: IEEE SMC, 2007: 1-8.
[4]
Gajek S, Sadeghi A R, Stuble C, et al. Compartmented security for browsers-or how to thwat a phisher with trusted computing//Proceedings of the 2nd International Conference on Availability, Reliability and Security. Washington D C: IEEE Computer Society, 2007: 120-127.
[5]
Me G, Pirro D, Sarrecchia R. A mobile based approach to strong authentication on web//Proceedings of the International Multi-Conference on Computing in the Global Information Technology. Washington D C: IEEE Computer Society, 2006: 67-67.
[6]
Schneier B. Password safe. .
[7]
Gabber E, Gibbons P B, Matias Y, et al. How to make personalized web browsing simple, secure and anonymous//Proceedings of Financial Cryptography'97. Anguilla: Springer-Verlag, 1997: 17-31.
[8]
Ross B, Jackson C, Miyake N, et al. Stronger password authentication using browser extensions//Proceedings of the 14th USENIX Security Symposium. California: USENIX Association Berkeley, 2005: 17-32.
[9]
Halderman J A, Waters B, Felten E W. A convenient method for securely managing passwords//Proceedings of the 14th International Conference on World Wide Web. Chiba: ACM Press, 2005: 471-479.
[10]
Yee K P, Sitaker K. Passpet: convenient password management and phishing protection//Proceedings of the Second Symposium on Usable Privacy and Security. New York: ACM, 2006: 32-43.