Authentication Schemes - Comparison and Effective Password Spaces

Peter Mayer, Melanie Volkamer, Michaela Kauer. Authentication Schemes - Comparison and Effective Password Spaces. In Atul Prakash, Rudrapatna K. Shyamasundar, editors, Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings. Volume 8880 of Lecture Notes in Computer Science, pages 204-225, Springer, 2014. [doi]

@inproceedings{MayerVK14,
  title = {Authentication Schemes - Comparison and Effective Password Spaces},
  author = {Peter Mayer and Melanie Volkamer and Michaela Kauer},
  year = {2014},
  doi = {10.1007/978-3-319-13841-1_12},
  url = {http://dx.doi.org/10.1007/978-3-319-13841-1_12},
  researchr = {https://researchr.org/publication/MayerVK14},
  cites = {0},
  citedby = {0},
  pages = {204-225},
  booktitle = {Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  editor = {Atul Prakash and Rudrapatna K. Shyamasundar},
  volume = {8880},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-13840-4},
}