|
[1]
|
Bosnjak, L. (2018) Brute-Force and Dictionary Attack on Hashed Real-World Passwords. 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, 21-25 May 2018, 1161-1166. [Google Scholar] [CrossRef]
|
|
[2]
|
Whisper Protocol. https://github.com/ethereum/wiki/wiki/Whisper
|
|
[3]
|
Benet, J. (2014) IPFS-Content Addressed, Versioned, P2Ple System. https://arxiv.org/abs/1407.3561
|
|
[4]
|
Wilkinson, S., Boshevski, T., Brandoff, J. and Buterin, V. (2018) Storj a Peer-to-Peer Cloud Storage Network. White Paper. https://storj.io/storj.pdf
|
|
[5]
|
Vorick, D. and Champine, L. (2014) Sia: Simple Decentralized Storage.
https://whitepaper.io/document/17/siacoin-whitepaper
|
|
[6]
|
OAuth 2.0. https://oauth.net/2
|
|
[7]
|
Sudhodanan, A., et al. (2018) Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries. IEEE European Symposium on Security and Privacy, Paris, 26-28 April 2017, 350-365. [Google Scholar] [CrossRef]
|
|
[8]
|
Liu, W., Deng, X., Huang, G. and Fu, A.Y. (2006) An Anti-Phishing Strategy Based on Visual Similarity Assessment. IEEE Internet Computing, 10, 58-65. [Google Scholar] [CrossRef]
|
|
[9]
|
Liu, W., Liu, G., Qiu, B. and Quan, X. (2012) Anti-Phishing through Phishing Target Discovery. IEEE Internet Computing, 16, 52-61. [Google Scholar] [CrossRef]
|
|
[10]
|
Yang, F. and Manoharan, S. (2013) A Security Analysis of the OAuth Protocol. Proceedings of Communications, Computers and Signal Processing, Victoria, 27-29 August 2013, 271-276. [Google Scholar] [CrossRef]
|
|
[11]
|
Blockstack ID. https://blockstack.org
|
|
[12]
|
uPort. https://www.uport.me
|
|
[13]
|
Saritekin, R.A. (2018) Blockchain Based Secure Communication Application Proposal: Cryptouch. 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, 22-25 March 2018, 1-4. [Google Scholar] [CrossRef]
|
|
[14]
|
OpenID. https://openid.net
|
|
[15]
|
SAML2.0. https://wiki.oasis-open.org/security/FrontPage
|
|
[16]
|
袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481-494.
|