1[1]Luby M,Rackoff C.A study of password security[C].Advances in Cryptology-CRYPTO′87, Proceedings, Springer_Verlag, 1987: 283-288
2[2]Feldmeier D C,P R Karn,P R. UNIX password security ---ten year later(invited )[C].Advances in Cryptology-CRYPTO, 89Proceedings,Springer_Verlag, 1989: 44-63
3[3]Schneier B.Applied Crytography---Protocals, Algorithms, and source Cede in C[M].Jone Wiley & Sons,1994
4[4]Beker H J,Cole G M.Message Authentication and Dynamic Passwords [ C ]. Advances in Cryptology - EUROCRYPT′ 87 Proceedings,Springer_Verlag, 1987:171-175