[1] |
杨肖. 基于群体的口令强度评价研究[D]. 上海:华东师范大学, 2019.
|
[2] |
汪定. 口令安全关键问题研究[D]. 北京:北京大学, 2017.
|
[3] |
WANG D, WANG P, HE D, et al. Name and Bifacial-security:Understanding Passwords of Chinese Web Users [C]//Proceedings of the 2019 28th USENIX Security Symposium.Berkeley:USENIX Association, 2019: 1537-1554.
|
[4] |
WANG D, GU Q, HUANG X, et al. Understanding Human-chosen PINs:Characteristics,Distribution and Security [C]//Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security.New York:ACM. 2017: 372-385.
|
[5] |
WANG D, WANG P, WANG C. Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-time Data Access in WSNs[J]. ACM Transactions on Cyber-Physical Systems, 2020,4(3):3325130.
|
[6] |
WANG D, LI W, WANG P. Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks[J]. IEEE Transactions on Industrial Informatics, 2018,14(9):4081-4092.
|
[7] |
WEGMAN M N, CARTER J L. New Hash Functions and Their Use in Authentication and Set Equality[J]. Journal of Computer and System Sciences, 1981,22(3):265-279.
|
[8] |
YUKSEL K. Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications[D].Worcester: Worcester Polytechnic Institute. 2004.
|
[9] |
HASTAD J, IMPAGLIAZZO R, LEVIN L A, et al. Pseudorandom Generator from Any One-way Function[J]. SIAM Journal on Computing, 1999,28(4):1364-1396.
|
[10] |
ISO/IEC.Information technology —ISO 7-bit 10coded character set for information interchange:ISO/IEC 646: 1991[S/OL].[2020-08-26]. https://www.iso.org/standard/4777.html.
|
[11] |
YU Y, STEINBERGER J. Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN [C]//Lecture Notes in Computer:9666.Heidelberg:Springer Verlag, 2016: 154-183.
|
[12] |
KRAWCZYKH, ERONEN P.HMAC-based Extract-and-Expand Key Derivation Function (HKDF):RFC 5869[S/OL].[2020-08-26]. https://www.rfc-editor.org/info/rfc5869.
|
[13] |
国家密码管理局.SM2 密码算法使用规范:GM/T0009—2012[S/OL].[2020-08-26].https://www.doc88.com/p-2174901057696.html.
|