pASSWORD tYPOS and How to Correct Them Securely
暂无分享,去创建一个
Thomas Ristenpart | Ari Juels | Devdatta Akhawe | Rahul Chatterjee | Anish Athayle | A. Juels | T. Ristenpart | Devdatta Akhawe | Rahul Chatterjee | Anish Athayle
[1] Matthew Smith,et al. On the ecological validity of a password study , 2013, SOUPS.
[2] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[3] Blase Ur,et al. Measuring password guessability for an entire university , 2013, CCS.
[4] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[5] Gregory V. Bard,et al. Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric , 2007, ACSW.
[6] S. Boztaş. Entropies, Guessing and Cryptography , 1999 .
[7] Benjamin B. M. Shao,et al. A Behavioral Analysis of Passphrase Design and Effectiveness , 2009, J. Assoc. Inf. Syst..
[8] Michael D. Buhrmester,et al. Amazon's Mechanical Turk , 2011, Perspectives on psychological science : a journal of the Association for Psychological Science.
[9] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[10] Michael K. Reiter,et al. The security of modern password expiration: an algorithmic framework and empirical analysis , 2010, CCS '10.
[11] Joseph Bonneau,et al. Guessing human-chosen secrets , 2012 .
[12] Burton S. Kaliski,et al. PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.
[13] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[14] D. Hochbaum. Approximating covering and packing problems: set cover, vertex cover, independent set, and related problems , 1996 .
[15] Blase Ur,et al. Correct horse battery staple: exploring the usability of system-assigned passphrases , 2012, SOUPS.
[16] M. Jakobsson. Rethinking Passwords to Adapt to Constrained Keyboards , 2011 .
[17] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[18] Richard T. Watson,et al. Using Social Network Analysis to Analyze Relationships Among IS Journals , 2009, J. Assoc. Inf. Syst..
[19] Blase Ur,et al. Can long passwords be secure and usable? , 2014, CHI.
[20] Rafail Ostrovsky,et al. Low distortion embeddings for edit distance , 2005, STOC '05.
[21] Leonid Reyzin,et al. When Are Fuzzy Extractors Possible? , 2016, IEEE Transactions on Information Theory.
[22] Joseph Bonneau,et al. Towards Reliable Storage of 56-bit Secrets in Human Memory , 2014, USENIX Security Symposium.
[23] Fred J. Damerau,et al. A technique for computer detection and correction of spelling errors , 1964, CACM.
[24] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[25] Yevgeniy Dodis. On extractors, error-correction and hiding all partial information , 2005, IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005..
[26] Thomas Ristenpart,et al. The Pythia PRF Service , 2015, USENIX Security Symposium.
[27] Blase Ur,et al. "I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab , 2015, SOUPS.
[28] Simon Josefsson,et al. The scrypt Password-Based Key Derivation Function , 2016, RFC.
[29] Benjamin B. M. Shao,et al. The usability of passphrases for authentication: An empirical field study , 2007, Int. J. Hum. Comput. Stud..
[30] M S Waterman,et al. Identification of common molecular subsequences. , 1981, Journal of molecular biology.
[31] Blase Ur,et al. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation , 2012, USENIX Security Symposium.
[32] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[33] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[34] Steven Skiena,et al. Improving Usability Through Password-Corrective Hashing , 2006, SPIRE.