暂无分享,去创建一个
Massimo Bernaschi | Giuseppe Ateniese | Dario Pasquini | Marco Cianfriglia | G. Ateniese | M. Bernaschi | Marco Cianfriglia | Dario Pasquini
[1] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[2] Maurizio Filippone,et al. Monte Carlo Strength Evaluation: Fast and Reliable Password Checking , 2015, CCS.
[3] Stuart E. Schechter,et al. Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks , 2010, HotSec.
[4] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[5] Massimo Bernaschi,et al. Improving Password Guessing via Representation Learning , 2019, IACR Cryptol. ePrint Arch..
[6] Alain Forget,et al. Improving text passwords through persuasion , 2008, SOUPS '08.
[7] Colin Percival. STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS , 2009 .
[8] Pietro Michiardi,et al. Password Strength: An Empirical Analysis , 2010, 2010 Proceedings IEEE INFOCOM.
[9] Blase Ur,et al. Measuring password guessability for an entire university , 2013, CCS.
[10] Yu-Chiang Frank Wang,et al. Learning Deep Latent Spaces for Multi-Label Classification , 2017, ArXiv.
[11] Blase Ur,et al. Measuring Real-World Accuracies and Biases in Modeling Password Guessability , 2015, USENIX Security Symposium.
[12] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Ross B. Girshick,et al. Focal Loss for Dense Object Detection , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Burton S. Kaliski,et al. PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.
[15] Lujo Bauer,et al. Of passwords and people: measuring the effect of password-composition policies , 2011, CHI.
[16] Mohammad Mannan,et al. From Very Weak to Very Strong: Analyzing Password-Strength Meters , 2014, NDSS.
[17] Donn Seeley. Password cracking: a game of wits , 1989, CACM.
[18] R.V. Yampolskiy. Analyzing User Password Selection Behavior for Reduction of Password Space , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[19] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[20] Samson Zhou,et al. On the Economics of Offline Password Cracking , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[21] Blase Ur,et al. Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks , 2016, USENIX Annual Technical Conference.
[22] S. Boztaş. Entropies, Guessing and Cryptography , 1999 .
[23] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[24] Matthew Smith,et al. On the ecological validity of a password study , 2013, SOUPS.
[25] Lujo Bauer,et al. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms , 2012, 2012 IEEE Symposium on Security and Privacy.
[26] Klaus-Robert Müller,et al. Covariate Shift Adaptation by Importance Weighted Cross Validation , 2007, J. Mach. Learn. Res..
[27] David Mazières,et al. A future-adaptive password scheme , 1999 .
[28] Blase Ur,et al. Reasoning Analytically about Password-Cracking Software , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[29] Markus Jakobsson,et al. The Benefits of Understanding Passwords , 2012, HotSec.
[30] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[31] Julie Thorpe,et al. On Semantic Patterns of Passwords and their Security Impact , 2014, NDSS.
[32] Daniel Lowe Wheeler. zxcvbn: Low-Budget Password Strength Estimation , 2016, USENIX Security Symposium.
[33] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.