[Other] Honeyword-based Authentication Techniques for Protecting Passwords: A Survey

h2747115507 Post time 3 day(s) ago | Show all posts |Read mode
Reward40points

journal:ACM Computing Surveys

Authors:Nilesh Chakraborty; Jianqiang Li; Victor C. M. Leung; Samrat Mondal; Yi Pan; Chengwen Luo; Mithun Mukherjee

Published date:2023-8-31

DOI:10.1145/3552431

PDF link:https://dl.acm.org/doi/pdf/10.1145/3552431

Article link:http://dx.doi.org/10.1145/3552431

Article Source:Association for Computing Machinery (ACM)


Remark:

Best Answer

Please adopt

View Full Content

Reply

Use magic Donate Report

All Reply1 Show all posts
Nixxiflo Post time 3 day(s) ago | Show all posts

This post has been completed

Completed attachments will be deleted within 24 hours.
Reply

Use magic Donate Report

Junior Member
  • post

  • reply

  • points

    40

Latest Reply

Return to the list