-
1
-
-
85071440512
-
Halting password puzzles: Hard-to-break encryption from humanmemorable keys
-
Boyen, X.: Halting password puzzles: hard-to-break encryption from humanmemorable keys. In: 16th USENIX Security Symposium-SECURITY 2007, pp. 119-134 (2007)
-
(2007)
16th USENIX Security Symposium-SECURITY 2007
, pp. 119-134
-
-
Boyen, X.1
-
5
-
-
0003532271
-
UNIX password security - 10 years later
-
Brassard, G. ed., Springer, Heidelberg
-
Feldmeier, D., Karn, P.: UNIX password security - 10 years later. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 44-63. Springer, Heidelberg (1990)
-
(1990)
CRYPTO 1989. LNCS
, vol.435
, pp. 44-63
-
-
Feldmeier, D.1
Karn, P.2
-
9
-
-
85087598856
-
Doodling our way to better authentication
-
Goldberg, J., Hagman, J., Sazawal, V.: Doodling our way to better authentication. In: Proceedings CHI 2002, pp. 868-869 (2002)
-
(2002)
Proceedings CHI 2002
, pp. 868-869
-
-
Goldberg, J.1
Hagman, J.2
Sazawal, V.3
-
10
-
-
33745886578
-
A convenient method for securely managing passwords
-
ACM Press, New York
-
Halderman, J. A., Waters, B., Felten, E. W.: A convenient method for securely managing passwords. In: WWW 2005: Proceedings of the 14th International Conference on World Wide Web, pp. 471-479. ACM Press, New York (2005)
-
(2005)
WWW 2005: Proceedings of the 14th International Conference on World Wide Web
, pp. 471-479
-
-
Halderman, J.A.1
Waters, B.2
Felten, E.W.3
-
11
-
-
85084161999
-
The design and analysis of graphical passwords
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: Proc. 8th USENIX Security Symposium, pp. 135-150 (1999)
-
(1999)
Proc. 8th USENIX Security Symposium
, pp. 135-150
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
13
-
-
33745788833
-
Fast dictionary attacks on passwords using timespace trade-off
-
Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using timespace trade-off. In: Proc. of ACM CCS 2005, pp. 364-372 (2005)
-
(2005)
Proc. of ACM CCS 2005
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
14
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
Boneh, D. ed., Springer, Heidelberg
-
Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617-630. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 617-630
-
-
Oechslin, P.1
-
15
-
-
85165845973
-
-
Account lockout attack (2009), http://www.owasp.org/index.php/Account- lockout-attack
-
(2009)
Account Lockout Attack
-
-
-
16
-
-
34547343585
-
Sweetbait: Zero-hour worm detection and containment using honeypots
-
TR IR-CS-015. Technical report, Vrije Universiteit
-
Portokalidis, G., Bos, H.: Sweetbait: Zero-hour worm detection and containment using honeypots. Technical report, Journal on Computer Networks, Special Issue on Security through Self-Protecting and Self-Healing Systems, TR IR-CS-015. Technical report, Vrije Universiteit (2005)
-
(2005)
Technical Report, Journal on Computer Networks, Special Issue on Security Through Self-protecting and Self-Healing Systems
-
-
Portokalidis, G.1
Bos, H.2
-
18
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.: Stronger password authentication using browser extensions. In: Proceedings of USENIX security (2005)
-
(2005)
Proceedings of USENIX Security
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
19
-
-
67649867487
-
An auto-responsive honeypot architecture for dynamic resource allocation and qos adaptation in ddos attacked networks
-
Sardana, A., Joshi, R.: An auto-responsive honeypot architecture for dynamic resource allocation and qos adaptation in ddos attacked networks. Comput. Commun. 32(12), 1384-1399 (2009)
-
(2009)
Comput. Commun.
, vol.32
, Issue.12
, pp. 1384-1399
-
-
Sardana, A.1
Joshi, R.2
-
20
-
-
78049368466
-
One of the 32 million with a rockyou account? you may want to change all your passwords
-
TechCrunch
-
TechCrunch. One of the 32 million with a rockyou account? you may want to change all your passwords. like now (2009), http://techcrunch.com/2009/12/14/ rockyou-hacked/
-
(2009)
Like Now
-
-
-
21
-
-
85165847221
-
-
Verisign
-
Verisign. Personal identity portal (2008), https://pip. verisignlabs.com/
-
(2008)
Personal Identity Portal
-
-
-
22
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
Weir, M., Aggarwal, S., Glodek, B., de Medeiros, B.: Password cracking using probabilistic context-free grammars. In: Proceedings of IEEE Security and Privacy (2009)
-
(2009)
Proceedings of IEEE Security and Privacy
-
-
Weir, M.1
Aggarwal, S.2
Glodek, B.3
De Medeiros, B.4
-
24
-
-
12844275960
-
Password memorability and security: Empirical results
-
Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Security and Privacy magazine 2(5), 25-31 (2004)
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|