[1] Yan J, Blackwell A, Anderson R, et al. The memorability and security of passwords-some empirical results[Z]. : University of Cambridge Computer Laboratory, 2000. [2] Hamilton S S, Carlisle M C, Hamilton J A. A global look at authentication//IWA'07. New York: IEEE SMC, 2007: 1-8. [3] Gajek S, Sadeghi A R, Stuble C, et al. Compartmented security for browsers-or how to thwat a phisher with trusted computing//Proceedings of the 2nd International Conference on Availability, Reliability and Security. Washington D C: IEEE Computer Society, 2007: 120-127. [4] Me G, Pirro D, Sarrecchia R. A mobile based approach to strong authentication on web//Proceedings of the International Multi-Conference on Computing in the Global Information Technology. Washington D C: IEEE Computer Society, 2006: 67-67. [5] Schneier B. Password safe. . http://www.counterpane.com/passsafe.html. [6] Gabber E, Gibbons P B, Matias Y, et al. How to make personalized web browsing simple, secure and anonymous//Proceedings of Financial Cryptography'97. Anguilla: Springer-Verlag, 1997: 17-31. [7] Ross B, Jackson C, Miyake N, et al. Stronger password authentication using browser extensions//Proceedings of the 14th USENIX Security Symposium. California: USENIX Association Berkeley, 2005: 17-32. [8] Halderman J A, Waters B, Felten E W. A convenient method for securely managing passwords//Proceedings of the 14th International Conference on World Wide Web. Chiba: ACM Press, 2005: 471-479. [9] Yee K P, Sitaker K. Passpet: convenient password management and phishing protection//Proceedings of the Second Symposium on Usable Privacy and Security. New York: ACM, 2006: 32-43. [10] Trusted Computing Group. TCG specification architecture overview specification. . http://www.trustedcomputinggroup.org. [11] Trusted Computing Group. TCG software stack (TSS) specification. . http://www.trustedcomputinggroup.org. [12] Trusted Computing Group. TPM main part 1 design principles specification. . http://www.trustedcomputinggroup.org. [13] Emigh A. Online identity theft: phishing technology, chokepoints and countermeasures[Z]. : Radix Labs, 2005. |