1Yah J, Blackwell A, Anderson and security: Empirical results. Magazine, 2004, 2(5): 25-31.
2R. Password memorability IEEE Security & Privacy Daniel V K. Foiling the cracker: A survey of, and improve- ments to, password security. Programming and Computer Software, 1992, 17(3): 158-166.
3Bloom B. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 1979, 13(7): 422-426.
4Chris D, Ravi G. BApasswd: A new proactive password eheeker//Proceedings of the 16th National Computer Security Conference. Baltimore, USA, 1993:1-15.
5Pham H P, Phan D D, Duong N T, et al. Password recoveryfor encrypted ZIP archives using GPUs//Proeeedings of the 2010 Symposium on Information and Communication Technology. Hanoi, Vietnam, 2010.. 27-28.
6Miller G A. The magical number seven, plus or minus two: Limits on our capacity for processing Information. Psycho- logical Review, 1956, 63(2): 81-87.
7Johnson G J. A distinctiveness model of serial learning. Psychological Review, 1991, 98(2): 204-217.
8Paivio A. Dual coding theory: Retrospect and current status. Journal of Psychology, 1991, 45(3) : 255-287.
9McDowell M, Hernan S, Rafail J. Security Tip (ST04-002) : Choosing and Protecting Passwords. US-CERT, 2013.06.
10Burr W E, Dodson D F, Newton E M, et al. Electronic Authentication Guideline. US-NIST. 2014.04.