ErsatzPasswords: ending password cracking
暂无分享,去创建一个
[1] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[2] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[3] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[4] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[5] Ronald L. Rivest,et al. Honeywords: making password-cracking detectable , 2013, CCS.
[6] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.
[7] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[8] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[9] Serge Egelman,et al. It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[10] Dan Boneh,et al. Kamouflage: Loss-Resistant Password Management , 2010, ESORICS.
[11] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[12] Haining Wang,et al. BogusBiter: A transparent protection against phishing attacks , 2010, TOIT.
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] Dirk Fox. Hardware Security Module (HSM) , 2009, Datenschutz und Datensicherheit - DuD.
[15] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[16] Sudhir Aggarwal,et al. Testing metrics for password creation policies by attacking large sets of revealed passwords , 2010, CCS '10.
[17] Angelos D. Keromytis,et al. SAuth: protecting user accounts from password database leaks , 2013, CCS.
[18] Lior Rokach,et al. HoneyGen: An automated honeytokens generator , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.