Pitfalls in the automated strengthening of passwords
暂无分享,去创建一个
[1] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[2] Sudhir Aggarwal,et al. Testing metrics for password creation policies by attacking large sets of revealed passwords , 2010, CCS '10.
[3] Sudhir Aggarwal,et al. Building better passwords using probabilistic techniques , 2012, ACSAC '12.
[4] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[5] Joseph Bonneau,et al. What ’ s in a Name ? Evaluating Statistical Attacks on Personal Knowledge Questions , 2010 .
[6] Alain Forget,et al. Memorability of persuasive passwords , 2008, CHI Extended Abstracts.
[7] Wanli Ma,et al. Password Entropy and Password Quality , 2010, 2010 Fourth International Conference on Network and System Security.
[8] M.D. Leonhard,et al. A comparative study of three random password generators , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[9] Blase Ur,et al. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation , 2012, USENIX Security Symposium.
[10] Lujo Bauer,et al. Of passwords and people: measuring the effect of password-composition policies , 2011, CHI.
[11] Alain Forget,et al. Helping users create better passwords: is this the right approach? , 2007, SOUPS '07.
[12] Elisa Bertino,et al. A comprehensive simulation tool for the analysis of password policies , 2009, International Journal of Information Security.
[13] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[14] Chlotia Posey Garrison. Encouraging good passwords , 2006, InfoSecCD '06.
[15] Lujo Bauer,et al. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms , 2012, 2012 IEEE Symposium on Security and Privacy.
[16] Alain Forget,et al. Improving text passwords through persuasion , 2008, SOUPS '08.
[17] M. Angela Sasse,et al. The true cost of unusable password policies: password use in the wild , 2010, CHI.
[18] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[19] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[20] Alain Forget,et al. Persuasion for Stronger Passwords: Motivation and Pilot Study , 2008, PERSUASIVE.
[21] David G. Reid,et al. A Case History , 1997 .
[22] Simon Marechal. Advances in password cracking , 2007, Journal in Computer Virology.
[23] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[24] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[25] Lujo Bauer,et al. Encountering stronger password requirements: user attitudes and behaviors , 2010, SOUPS.
[26] Claude Castelluccia,et al. Adaptive Password-Strength Meters from Markov Models , 2012, NDSS.
[27] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.