[1] |
胡卫, 吴晓平, 张昌宏 , 等. 图形密码身份认证方案设计及其安全性分析[J]. 计算机工程与设计, 2009,30(14):3284-3287.
|
|
Hu Wei, Wu Xiaoping, Zhang Changhong , et al. Graphical password authentication scheme design and security analysis[J]. Computer Engineering and Design, 2009,30(14):3284-3287.
|
[2] |
Standing L, Conezio J, Haber R N . Perception and memory for pictures:Single-trial learning of 2500 visual stimuli[J]. Psychonomic Science, 1970,19(2):73-74.
doi: 10.3758/BF03337426
|
[3] |
Chiasson S, Van Oorschot P C, Biddle R . Graphical password authentication using cued click points [C]. Berlin:European Symposium on Research in Computer Security, Springer, 2007.
|
[4] |
Belk M, Germanakos P, Fidas C, et al. Studying the effect of human cognition on user authentication tasks [C]. Berlin:International Conference on User Modeling, Adaptation, and Personalization. Springer, 2013.
|
[5] |
Tao H, Adams C . Pass-Go:a proposal to improve the usability of graphical passwords[J]. International Journal of Network Security, 2008,7(2):273-292.
|
[6] |
Brostoff S, Sasse M A . Are passfaces more usable than passwords? a field trial investigation[M]. London:Springer, 2000.
|
[7] |
Davis D, Monrose F, Reiter M K. On user choice in graphical password schemes [C].San Diego:Conference on Usenix Security Symposium,USENIX Association, 2004.
|
[8] |
Wang H, Xu J, Yao B. Exploring new cryptographical construction of complex network data [C].Changsha:IEEE International Conference on Data Science in Cyberspace (DSC),IEEE, 2016.
|
[9] |
Wang H Y, Jin X U, Yao B . New labellings based on the idea of graphical construction plus number theory for designing cryptographs[J].Research Gate, 2017(smce):114-120.
|
[10] |
Mc Kay B D .Nauty software program, version 2.2[DB/OL].( 2013- 02- 20)[2018-03-01] .
|
[11] |
Bondy J A , Murty U S R .Graph theory with applications[M]. London:Macmillan, 1976.
|
[12] |
Balakrishnan R, Selvam A, Yegnanarayanan V . Some results on elegant graphs[J]. Indian Journal of Pure & Applied Mathematics, 1997,28(7):98-107.
|
[13] |
Skupień, Zdzis A W, Andrzej A K . Rainbow regular order of graphs[J]. Australasian Journal of Combinatorics, 2008,42(42):115-127.
|
[14] |
Zhou X, Yao B, Chen X . Every lobster is odd-elegant[J]. Information Processing Letters, 2013,113(1-2):30-33.
doi: 10.1016/j.ipl.2012.09.008
|
[15] |
马德山, 刘林忠 . 1—树图的邻强边染色[J]. 数学研究与评论, 2000,20(2):299-305.
|
|
Ma Deshan, Liu Linzhong . Adjacent strong edge staining of 1-tree graphs[J]. Journal of Mathematical Research and Exposition, 2000,20(2):299-305.
|
[16] |
辛利斌, 张振国, 王顺平 , 等. 自动指纹识别系统算法的优化改良[J]. 电子科技, 2016,29(12):41-43.
|
|
Xin Libin, Zhang Zhenguo, Wang Shunping , et al. Optimization of automatic fingerprint identification system algorithms[J]. Electronic Science and Technology, 2016,29(12):41-43.
|