Phoney: protecting password hashes with threshold cryptology and honeywords

Rong Wang, Hao Chen, Jianhua Sun. Phoney: protecting password hashes with threshold cryptology and honeywords. IJES, 8(2/3):146-154, 2016. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.