[1]
Rui Wang, Shuo Chen, XiaoFeng Wang. Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services[C]. /The 2012 IEEE Symposium on Security and Privacy, IEEE Computer Society Washington, DC, USA; 2012: 365-379.
DOI: 10.1109/sp.2012.30
Google Scholar
[2]
Florencio D, Herley C. A large-scale study of web password habits[C]. /The 16th International Conference on World Wide Web, ACM New York, NY, USA; 2007: 657-669.
DOI: 10.1145/1242572.1242661
Google Scholar
[3]
Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, G. Pellegrino. From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure[C]. / The 6th international conference on Tests and Proofs, Springer-Verlag Berlin, Heidelberg; 2012: 3-18.
DOI: 10.1007/978-3-642-21424-0_6
Google Scholar
[4]
San-Tsai Sun, Eric Pospisil, Eric Pospisil, etc al. What Makes Users Refuse Web Single Sign-On? An Empirical Investigation of OpenID[C]. /The 7th Symposium on Usable Privacy and Security, ACM New York, NY, USA; 2011: 4-16.
DOI: 10.1145/2078827.2078833
Google Scholar
[5]
Andreas Leicher, Andreas U., Yogendra Shah. Schmidt Trusted computing enhanced user authentication with OpenID and trustworthy user interface[J]. International Journal of Internet Technology and Secured Transactions archive. 2011: 3(4): 331-353.
DOI: 10.1504/ijitst.2011.043133
Google Scholar
[6]
Harnik D, Kolodner E K, Shulman-Peleg A. Secure access mechanism for cloud storage[J]. Scalable Computing: Practice and Experience, 2011(12): 317-336.
Google Scholar
[7]
Halevi S, Danny H , Shulman-Peleg A . Proofs of ownership in remote storage systems[C]. /The 18th ACM conference on Computer and communications security, New York: ACM, 2011: 491-500.
DOI: 10.1145/2046707.2046765
Google Scholar
[8]
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores[C]. /The 14th ACM conference on Computer and communications security, New York: ACM, 2007: 598-609.
DOI: 10.1145/1315245.1315318
Google Scholar
[9]
Dolev D, Yao A. On the securi ty of public key pro tocols[J]. IEEE Transactions on Informat ion Theory Mar. 1983: 29(2): 198-208.
Google Scholar
[10]
W. Dai. Crypto++ Library, 5. 6. 1, Jan, 2011. http: /www. cryptopp. com.
Google Scholar