Password Cracking Using Probabilistic Context-Free Grammars
暂无分享,去创建一个
Sudhir Aggarwal | Breno de Medeiros | Matt Weir | Bill Glodek | S. Aggarwal | B. D. Medeiros | M. Weir | Bill Glodek
[1] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[2] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[3] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[4] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[5] Alaa A. Kharbouch,et al. Three models for the description of language , 1956, IRE Trans. Inf. Theory.
[6] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[7] Gershon Kedem,et al. Brute Force Attack on UNIX Passwords with SIMD Computer , 1999, USENIX Security Symposium.
[8] Ingrid Verbauwhede,et al. Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking , 2006, ARC.
[9] Matt Bishop,et al. Improving system security via proactive password checking , 1995, Comput. Secur..
[10] R.V. Yampolskiy. Analyzing User Password Selection Behavior for Reduction of Password Space , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[11] Noam Chomsky,et al. Three models for the description of language , 1956, IRE Trans. Inf. Theory.
[12] Udi Manber,et al. A simple scheme to make passwords based on one-way functions much harder to crack , 1996, Comput. Secur..
[13] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.