메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Password strength: An empirical analysis

Author keywords

[No Author keywords available]

Indexed keywords

DATA SETS; EMPIRICAL ANALYSIS; ORDERS OF MAGNITUDE; PASSWORD STRENGTH; PROBABILISTIC MODELS; SECURITY OF AUTHENTICATION;

EID: 77953306210     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5461951     Document Type: Conference Paper
Times cited : (236)

References (22)
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • December
    • A. Adams and M. A. Sasse, "Users are not the enemy," Commun. ACM, vol. 42, no. 12, pp. 40-46, December 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 39349101677 scopus 로고    scopus 로고
    • Password security: What users know and what they actually do
    • February
    • S. Riley, "Password security: What users know and what they actually do," Usability News, vol. 8, no. 1, February 2006.
    • (2006) Usability News , vol.8 , Issue.1
    • Riley, S.1
  • 4
    • 0018543411 scopus 로고
    • Password security: A case history
    • November
    • R. Morris and K. Thompson, "Password security: a case history," Commun. ACM, vol. 22, no. 11, pp. 594-597, November 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 5
    • 0040231044 scopus 로고    scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • D. V. Klein, "Foiling the cracker: A survey of, and improvements to, password security," in Proc. USENIX UNIX Security Workshop, 1990.
    • Proc. USENIX UNIX Security Workshop, 1990
    • Klein, D.V.1
  • 8
    • 33745788833 scopus 로고    scopus 로고
    • Fast dictionary attacks on passwords using time-space tradeoff
    • A. Narayanan and V. Shmatikov, "Fast dictionary attacks on passwords using time-space tradeoff," in CCS 2005, 2005, pp. 364-372.
    • CCS 2005, 2005 , pp. 364-372
    • Narayanan, A.1    Shmatikov, V.2
  • 9
    • 85001728633 scopus 로고    scopus 로고
    • Password security: An empirical investigation into e-commerce passwords and their crack times
    • J. A. Cazier and D. B. Medlin, "Password security: An empirical investigation into e-commerce passwords and their crack times," Information Security Journal: A Global Perspective, vol. 15, no. 6, pp. 45-55, 2006.
    • (2006) Information Security Journal: A Global Perspective , vol.15 , Issue.6 , pp. 45-55
    • Cazier, J.A.1    Medlin, D.B.2
  • 10
    • 38849143105 scopus 로고    scopus 로고
    • Advances in password cracking
    • February
    • S. Marechal, "Advances in password cracking," Journal in Computer Virology, vol. 4, no. 1, pp. 73-81, February 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.1 , pp. 73-81
    • Marechal, S.1
  • 12
    • 77953297716 scopus 로고    scopus 로고
    • Retrieved on 29/07/2009. [Online]. Available
    • "John the ripper - cracking modes," Retrieved on 29/07/2009. [Online]. Available: http://www.openwall.com/john/doc/MODES.shtml
    • John the Ripper - Cracking Modes
  • 13
    • 2942728016 scopus 로고    scopus 로고
    • Telling humans and computers apart automatically
    • L. von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," Commun. ACM, vol. 47, no. 2, pp. 56-60, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.2 , pp. 56-60
    • Von Ahn, L.1    Blum, M.2    Langford, J.3
  • 14
    • 0038687701 scopus 로고    scopus 로고
    • Securing passwords against dictionary attacks
    • B. Pinkas and T. Sander, "Securing passwords against dictionary attacks," in Proc. CCS '02, 2002, pp. 161-170.
    • Proc. CCS '02, 2002 , pp. 161-170
    • Pinkas, B.1    Sander, T.2
  • 15
    • 35248858454 scopus 로고    scopus 로고
    • Making a faster cryptanalytic time-memory trade-off
    • P. Oechslin, "Making a faster cryptanalytic time-memory trade-off," in Advances in Cryptology - CRYPTO 2003, 2003, pp. 617-630.
    • (2003) Advances in Cryptology - CRYPTO 2003 , pp. 617-630
    • Oechslin, P.1
  • 16
    • 1942508825 scopus 로고    scopus 로고
    • A real-world analysis of Kerberos password security
    • T. Wu, "A real-world analysis of Kerberos password security," in Proc. NDSS 1999, February 1999.
    • Proc. NDSS 1999, February 1999
    • Wu, T.1
  • 17
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop, "Improving system security via proactive password checking," Computers & Security, vol. 14, no. 3, pp. 233-249, 1995.
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1
  • 18
    • 0242708748 scopus 로고    scopus 로고
    • A note on proactive password checking
    • ACM
    • J. J. Yan, "A note on proactive password checking," in Proc. NSPW '01. ACM, 2001, pp. 127-135.
    • (2001) Proc. NSPW '01 , pp. 127-135
    • Yan, J.J.1
  • 20
    • 77953300535 scopus 로고    scopus 로고
    • A brief analysis of 40,000 leaked MySpace passwords
    • November [Online]. Available
    • S. Porst, "A brief analysis of 40,000 leaked MySpace passwords," Blog post, November 2007. [Online]. Available: http://www.the-interweb.com/serendipity/index.php?/archives/94-A-brief-analysis- of-40,000-leaked-MySpace-passwords.html
    • (2007) Blog Post
    • Porst, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.