Phoney: protecting password hashes with threshold cryptology and honeywords

Rong Wang, Hao Chen, Jianhua Sun. Phoney: protecting password hashes with threshold cryptology and honeywords. IJES, 8(2/3):146-154, 2016. [doi]

Authors

Rong Wang

This author has not been identified. Look up 'Rong Wang' in Google

Hao Chen

This author has not been identified. It may be one of the following persons: Look up 'Hao Chen' in Google

Jianhua Sun

This author has not been identified. Look up 'Jianhua Sun' in Google