Honeywords : making password-cracking detectable Citation
暂无分享,去创建一个
[1] Sudhir Aggarwal,et al. Building better passwords using probabilistic techniques , 2012, ACSAC '12.
[2] William Cheswick. Rethinking Passwords , 2012 .
[3] Jan Camenisch,et al. Practical yet universally composable two-server password-authenticated secret sharing , 2012, CCS.
[4] Dan S. Wallach,et al. Strengthening user authentication through opportunistic cryptographic identity assertions , 2012, CCS.
[5] Joseph Bonneau,et al. Guessing human-chosen secrets , 2012 .
[6] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Lujo Bauer,et al. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms , 2012, 2012 IEEE Symposium on Security and Privacy.
[8] Paul C. van Oorschot,et al. A Research Agenda Acknowledging the Persistence of Passwords , 2012, IEEE Security & Privacy.
[9] Claude Castelluccia,et al. How Unique and Traceable Are Usernames? , 2011, PETS.
[10] Marcus Bakker,et al. GPU-based password cracking , 2011 .
[11] Michael K. Reiter,et al. The security of modern password expiration: an algorithmic framework and empirical analysis , 2010, CCS '10.
[12] Dan Boneh,et al. Kamouflage: Loss-Resistant Password Management , 2010, ESORICS.
[13] Stuart E. Schechter,et al. Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks , 2010, HotSec.
[14] Joseph Bonneau,et al. The Password Thicket: Technical and Market Failures in Human Authentication on the Web , 2010, WEIS.
[15] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[16] Serge Egelman,et al. It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[17] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[18] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[19] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[20] Alain Forget,et al. Improving text passwords through persuasion , 2008, SOUPS '08.
[21] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[22] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[23] F. Cohen. The Use of Deception Techniques : Honeypots and Decoys , 2004 .
[24] Ari Juels,et al. A New Two-Server Approach for Authentication with Short Secrets , 2003, USENIX Security Symposium.
[25] Ross Anderson,et al. Fortifying key negotiation schemes with poorly chosen passwords , 1994 .
[26] Eugene H. Spafford,et al. Observations on reusable password choices , 1992 .
[27] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[28] Edwin Weiss,et al. A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.
[29] George B. Purdy,et al. A high security log-in procedure , 1974, Commun. ACM.