-
2
-
-
0043232732
-
Users are not the enemy
-
December
-
A. Adams and M. A. Sasse, "Users are not the enemy," Commun. ACM, vol. 42, no. 12, pp. 40-46, December 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
39349101677
-
Password security: What users know and what they actually do
-
February
-
S. Riley, "Password security: What users know and what they actually do," Usability News, vol. 8, no. 1, February 2006.
-
(2006)
Usability News
, vol.8
, Issue.1
-
-
Riley, S.1
-
4
-
-
0018543411
-
Password security: A case history
-
November
-
R. Morris and K. Thompson, "Password security: a case history," Commun. ACM, vol. 22, no. 11, pp. 594-597, November 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
5
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
D. V. Klein, "Foiling the cracker: A survey of, and improvements to, password security," in Proc. USENIX UNIX Security Workshop, 1990.
-
Proc. USENIX UNIX Security Workshop, 1990
-
-
Klein, D.V.1
-
7
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
IEEE, May
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek, "Password cracking using probabilistic context-free grammars," in IEEE Symposium on Security and Privacy. IEEE, May 2009, pp. 391-405.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
8
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
A. Narayanan and V. Shmatikov, "Fast dictionary attacks on passwords using time-space tradeoff," in CCS 2005, 2005, pp. 364-372.
-
CCS 2005, 2005
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
9
-
-
85001728633
-
Password security: An empirical investigation into e-commerce passwords and their crack times
-
J. A. Cazier and D. B. Medlin, "Password security: An empirical investigation into e-commerce passwords and their crack times," Information Security Journal: A Global Perspective, vol. 15, no. 6, pp. 45-55, 2006.
-
(2006)
Information Security Journal: A Global Perspective
, vol.15
, Issue.6
, pp. 45-55
-
-
Cazier, J.A.1
Medlin, D.B.2
-
10
-
-
38849143105
-
Advances in password cracking
-
February
-
S. Marechal, "Advances in password cracking," Journal in Computer Virology, vol. 4, no. 1, pp. 73-81, February 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.1
, pp. 73-81
-
-
Marechal, S.1
-
12
-
-
77953297716
-
-
Retrieved on 29/07/2009. [Online]. Available
-
"John the ripper - cracking modes," Retrieved on 29/07/2009. [Online]. Available: http://www.openwall.com/john/doc/MODES.shtml
-
John the Ripper - Cracking Modes
-
-
-
13
-
-
2942728016
-
Telling humans and computers apart automatically
-
L. von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," Commun. ACM, vol. 47, no. 2, pp. 56-60, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.2
, pp. 56-60
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
14
-
-
0038687701
-
Securing passwords against dictionary attacks
-
B. Pinkas and T. Sander, "Securing passwords against dictionary attacks," in Proc. CCS '02, 2002, pp. 161-170.
-
Proc. CCS '02, 2002
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
15
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
P. Oechslin, "Making a faster cryptanalytic time-memory trade-off," in Advances in Cryptology - CRYPTO 2003, 2003, pp. 617-630.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, pp. 617-630
-
-
Oechslin, P.1
-
16
-
-
1942508825
-
A real-world analysis of Kerberos password security
-
T. Wu, "A real-world analysis of Kerberos password security," in Proc. NDSS 1999, February 1999.
-
Proc. NDSS 1999, February 1999
-
-
Wu, T.1
-
17
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop, "Improving system security via proactive password checking," Computers & Security, vol. 14, no. 3, pp. 233-249, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
-
18
-
-
0242708748
-
A note on proactive password checking
-
ACM
-
J. J. Yan, "A note on proactive password checking," in Proc. NSPW '01. ACM, 2001, pp. 127-135.
-
(2001)
Proc. NSPW '01
, pp. 127-135
-
-
Yan, J.J.1
-
20
-
-
77953300535
-
A brief analysis of 40,000 leaked MySpace passwords
-
November [Online]. Available
-
S. Porst, "A brief analysis of 40,000 leaked MySpace passwords," Blog post, November 2007. [Online]. Available: http://www.the-interweb.com/serendipity/index.php?/archives/94-A-brief-analysis- of-40,000-leaked-MySpace-passwords.html
-
(2007)
Blog Post
-
-
Porst, S.1
-
21
-
-
34250767745
-
Human selection of mnemonic phrase-based passwords
-
C. Kuo, S. Romanosky, and L. F. Cranor, "Human selection of mnemonic phrase-based passwords," in Proc. SOUPS '06, 2006, pp. 67-78.
-
Proc. SOUPS '06, 2006
, pp. 67-78
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
|