CompChall: addressing password guessing attacks
暂无分享,去创建一个
Sugata Sanyal | Ajith Abraham | Vipul Goyal | Virendra Kumar | Mayank Singh | A. Abraham | S. Sanyal | Vipul Goyal | Mayank Singh | Virendra Kumar
[1] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[3] Ronald L. Rivest,et al. Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.
[4] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[5] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[6] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1998, CCS '98.
[7] Vipul Goyal,et al. How To Re-initialize a Hash Chain , 2004, IACR Cryptol. ePrint Arch..
[8] Benny Pinkas,et al. Securing passwords against dictionary attacks , 2002, CCS '02.
[9] Jitendra Malik,et al. Recognizing objects in adversarial clutter: breaking a visual CAPTCHA , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..
[10] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1999 .