메뉴 건너뛰기




Volumn , Issue , 2010, Pages 176-186

The security of modern password expiration: An algorithmic framework and empirical analysis

Author keywords

Password expiration; Passwords; User authentication

Indexed keywords

ALGORITHMIC FRAMEWORK; DATA SETS; EFFICIENT ALGORITHM; EMPIRICAL ANALYSIS; OPTIMAL SEARCH STRATEGY; PASSWORD EXPIRATION; PASSWORDS; USER AUTHENTICATION;

EID: 78650011800     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866328     Document Type: Conference Paper
Times cited : (159)

References (28)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • December
    • A. Adams and M. A. Sasse. Users are not the enemy. Comm. ACM, 42(12):40-46, December 1999.
    • (1999) Comm. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 2
    • 78650027619 scopus 로고    scopus 로고
    • Defense of password expiration
    • April as of March 28 2010
    • S. Alexander, Jr. In defense of password expiration. Post to LOPSA blog, April 2006. http://lopsa.org/node/295 as of March 28, 2010.
    • (2006) Post to LOPSA Blog
    • Alexander Jr., S.1
  • 3
    • 33144475034 scopus 로고    scopus 로고
    • Unconventional wisdom
    • January-February
    • S. M. Bellovin. Unconventional wisdom. IEEE Security & Privacy, 4(1), January-February 2006.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.1
    • Bellovin, S.M.1
  • 6
    • 78650026170 scopus 로고    scopus 로고
    • W. E. Burr, D. F. Dodson, W. T. Polk, P. J. Bond, and A. L. Bement. NIST special publication 800-63, version 1.0.1, 2004
    • W. E. Burr, D. F. Dodson, W. T. Polk, P. J. Bond, and A. L. Bement. NIST special publication 800-63, version 1.0.1, 2004.
  • 8
    • 33847272670 scopus 로고    scopus 로고
    • The string edit distance matching problem with moves
    • February
    • G. Cormode and S. Muthukrishnan. The string edit distance matching problem with moves. ACM Transactions on Algorithms, 3:1-19, February 2007.
    • (2007) ACM Transactions on Algorithms , vol.3 , pp. 1-19
    • Cormode, G.1    Muthukrishnan, S.2
  • 9
    • 67549108038 scopus 로고
    • How crackers crack passwords or what passwords to avoid
    • USENIX, August
    • A. M. De Alvare. How crackers crack passwords or what passwords to avoid. In Second Security Workshop Program, pages 103-112. USENIX, August 1990.
    • (1990) Second Security Workshop Program , pp. 103-112
    • De Alvare, A.M.1
  • 11
    • 21044440739 scopus 로고    scopus 로고
    • Approximating min sum set cover
    • U. Feige, L. Lovász, and P. Tetali. Approximating min sum set cover. Algorithmica, 40:219-234, 2004.
    • (2004) Algorithmica , vol.40 , pp. 219-234
    • Feige, U.1    Lovász, L.2    Tetali, P.3
  • 12
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • May
    • D. Florêncio and C. Herley. A large-scale study of web password habits. In WWW 2007, May 2007.
    • (2007) WWW 2007
    • Florêncio, D.1    Herley, C.2
  • 14
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • USENIX, August
    • D. V. Klein. Foiling the cracker: A survey of, and improvements to, password security. In Second Security Workshop Program, pages 5-14. USENIX, August 1990.
    • (1990) Second Security Workshop Program , pp. 5-14
    • Klein, D.V.1
  • 15
    • 34250767745 scopus 로고    scopus 로고
    • Human selection of mnemonic phrase-based passwords
    • July
    • C. Kuo, S. Romanosky, and L. F. Cranor. Human selection of mnemonic phrase-based passwords. In SOUPS, pages 67-78, July 2006.
    • (2006) SOUPS , pp. 67-78
    • Kuo, C.1    Romanosky, S.2    Cranor, L.F.3
  • 16
    • 33646700923 scopus 로고    scopus 로고
    • Managing multiple passwords and multiple logins: MiFA minimal-feedback hints for remote authentication
    • B. Lu and M. B. Twidale. Managing multiple passwords and multiple logins: MiFA minimal-feedback hints for remote authentication. In IFIP INTERACT 2003 Conference, pages 821-824, 2003.
    • (2003) IFIP INTERACT 2003 Conference , pp. 821-824
    • Lu, B.1    Twidale, M.B.2
  • 18
    • 0018543411 scopus 로고
    • Password security: A case history
    • November
    • R. Morris and K. Thompson. Password security: A case history. Comm. ACM, 22:594-597, November 1979.
    • (1979) Comm. ACM , vol.22 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 20
    • 35248858454 scopus 로고    scopus 로고
    • Making a faster cryptanalytic time-memory trade-off
    • August
    • P. Oechslin. Making a faster cryptanalytic time-memory trade-off. In Advances in Cryptology - CRYPTO 2003, pages 617-630, August 2003.
    • (2003) Advances in Cryptology - CRYPTO 2003 , pp. 617-630
    • Oechslin, P.1
  • 21
    • 12844251094 scopus 로고    scopus 로고
    • Letter to comm. ACM
    • April
    • B. Patterson. Letter to Comm. ACM. Comm. ACM, 43(4):11-12, April 2000.
    • (2000) Comm. ACM , vol.43 , Issue.4 , pp. 11-12
    • Patterson, B.1
  • 23
    • 0026869371 scopus 로고
    • Opus: Preventing weak password choices
    • E. H. Spafford. Opus: Preventing weak password choices. Computers & Security, 11:273-278, 1991.
    • (1991) Computers & Security , vol.11 , pp. 273-278
    • Spafford, E.H.1
  • 24
    • 78649998898 scopus 로고    scopus 로고
    • Security myths and passwords
    • April as of March 28, 2010
    • G. Spafford. Security myths and passwords. Post to CERIAS blog, April 2006. http://www.cerias.purdue.edu/ site/blog/post/password-change-myths/ as of March 28, 2010.
    • (2006) Post to CERIAS Blog
    • Spafford, G.1
  • 27
    • 0242708748 scopus 로고    scopus 로고
    • A note on proactive password checking
    • J. Yan. A note on proactive password checking. In ACM New Security Paradigms Workshop, pages 127-135, 2001.
    • (2001) ACM New Security Paradigms Workshop , pp. 127-135
    • Yan, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.