Phoney: protecting password hashes with threshold cryptology and honeywords

Rong Wang, Hao Chen, Jianhua Sun. Phoney: protecting password hashes with threshold cryptology and honeywords. IJES, 8(2/3):146-154, 2016. [doi]

Abstract

Abstract is missing.