References
- Cullen, D.: Product Keys and Hashing, https://bnetdocs.org/?op=doc did=20 (2010)
- Crevato, C., Sgarro, A.: General Lower Bounds for Chosen-Content Attacks Against Authentication Codes, Journal of Discrete Mathematical Sciences & Cryptography, 1 (1), pp. 63-72 (1998) doi: 10.1080/09720529.1998.10697865
- Gas, G., Verheul, E.R.: Best Effort and Practice Activation Codes, in: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.), Trust, Privacy and Security in Digital Business, pp. 98-142, Springer, New York (2011)
- Google: 2-Step Verification, RCF 2104, https://www landing/2step/features.html
- Hermans, P.: How to Implement Email Verification for New Members, Envato Pty Ltd, https://code.tutsplus.com/tutorials/how-to-implement-email-verification-for-new-members–net-3824 (2009)
- Kofahi, N.A., Al-Somani, T., Al-Zamil, K.: Performance Study of Some Symmetric Block Cipher Algorithms Under Linux Operating System, Journal of Discrete Mathematical Sciences & Cryptography, 7 (3), pp. 359-370 (2004) doi: 10.1080/09720529.2004.10698014
- Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication, https://tools.ietf.org/html/rfc2104 (1997)
- Li M., Susilo W., Tonien J.: Securing Shared Systems, in: Luo Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2016. Lecture Notes in Computer Science, 9929, pp. 194-201, Springer, Cham (2016)
- Licenturion: Inside Windows Product Activation, Germany, http://www.licenturion.com/xp/ (2001)
- Luby, M., Rackoff, C.: How to Construct Pseudorandom Permutations from Pseudorandom Functions, SIAM Journal on Computing 17 (2), pp. 373386 (1988) doi: 10.1137/0217022
- Microsoft: Description of Symmetric and Asymmetric Encryption, https://support.microsoft.com/en-us/kb/246071 (2007)
- National Australia Bank Limited: SMS Security, http://www.nab. com.au/personal/banking/nab-internet-banking/security/sms-security
- Penton: Symmetric vs. Asymmetric Ciphers, http://windowsitpro.com/security/symmetric-vs-asymmetric-ciphers (2016)
- Rouse, M.: Data Encryption Standard (DES), http://searchsecurity.techtarget.com/definition/Data-Encryption-Standard (2014)
- Staggs, B.: Implementing a Partial Serial Number Verification System in Delphi, http://www.brandonstaggs.com/2007/07/26/implementing-a-partial-serial-number-verification-system-in-delphi/ (2007)
- Stinson, D.R.: Cryptography Theory and Practice, CRC Press, Inc (1995)