메뉴 건너뛰기




Volumn 3110, Issue , 2004, Pages 39-53

Addressing online dictionary attacks with login histories and humans-in-the-loop (extended abstract)

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTERS;

EID: 35048814173     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27809-2_5     Document Type: Article
Times cited : (9)

References (27)
  • 3
    • 0000556454 scopus 로고
    • Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attack
    • Oakland, May
    • S. Bellovin, M. Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attack", Proc. IEEE Symp. Research in Security and Privacy, Oakland, May 1992.
    • (1992) Proc. IEEE Symp. Research in Security and Privacy
    • Bellovin, S.1    Merritt, M.2
  • 5
    • 0038482881 scopus 로고    scopus 로고
    • web site, first appeared
    • CAPTCHA Project web site, http://www.captcha.net/ (first appeared: 2000).
    • (2000) CAPTCHA Project
  • 8
    • 84943235829 scopus 로고
    • Pricing via Processing or Combatting Junk Mail
    • Proceedings of CRYPTO'92
    • C. Dwork, M. Naor, "Pricing via Processing or Combatting Junk Mail", Lecture Notes in Computer Science 740 (Proceedings of CRYPTO'92), 1993, pp. 137-147.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 137-147
    • Dwork, C.1    Naor, M.2
  • 9
    • 0041847762 scopus 로고
    • Federal Information Processing Standards Publication 112, U.S. Department of Commerce, NIST
    • Password Usage, Federal Information Processing Standards Publication 112, U.S. Department of Commerce, NIST, 1985.
    • (1985) Password Usage
  • 10
    • 33750922440 scopus 로고
    • FIPS Pub 112, U.S. Dept. Commerce
    • Automated Password Generator, FIPS Pub 112, U.S. Dept. Commerce, 1993.
    • (1993) Automated Password Generator
  • 12
    • 0025545832 scopus 로고    scopus 로고
    • Verifiable-text attacks in cryptographic protocols
    • L. Gong, "Verifiable-text attacks in cryptographic protocols", 1990 IEEE INFOCOM, pp.686-693.
    • 1990 IEEE INFOCOM , pp. 686-693
    • Gong, L.1
  • 14
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • Oct.
    • D. Jablon, "Strong password-only authenticated key exchange", ACM Computer Communcations Review, Oct.1996.
    • (1996) ACM Computer Communcations Review
    • Jablon, D.1
  • 17
    • 0024940229 scopus 로고
    • Reducing risks from poorly chosen keys
    • presented ACM Symp. on Operating Systems Principles
    • T. Lomas, L. Gong, J. Saltzer, R. Needham, "Reducing risks from poorly chosen keys", Operating Systems Review vol.13, pp.14-18 (presented at 1989 ACM Symp. on Operating Systems Principles).
    • (1989) Operating Systems Review , vol.13 , pp. 14-18
    • Lomas, T.1    Gong, L.2    Saltzer, J.3    Needham, R.4
  • 26
    • 0008915230 scopus 로고    scopus 로고
    • The Memorability and Security of Passwords - Some Empirical Results
    • Computer Lab, Cambridge
    • J. Yan, A. Blackwell, R. Anderson, A. Grant, "The Memorability and Security of Passwords - Some Empirical Results", Tech. Report 500, Computer Lab, Cambridge, 2000. http://www.ftp.cl.cam.ac.uk/ftp/rja14/tr500.pdf.
    • (2000) Tech. Report , vol.500
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.