-
1
-
-
45849116070
-
-
Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, April
-
W. Burr, D. Dodson, R. Perlner, W. Polk, S. Gupta, E. Nabbus, "NIST Special Publication 800-63-1 Electronic Authentication Guideline", Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, April, 2006
-
(2006)
NIST Special Publication 800-63-1 Electronic Authentication Guideline
-
-
Burr, W.1
Dodson, D.2
Perlner, R.3
Polk, W.4
Gupta, S.5
Nabbus, E.6
-
3
-
-
78650008552
-
-
Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD
-
P. Bowen, A. Johnson, J. Hash, C. Dancy Smith, D. Steinberg, "NIST Special Publication 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule", Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD.
-
NIST Special Publication 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
-
-
Bowen, P.1
Johnson, A.2
Hash, J.3
Smith, C.D.4
Steinberg, D.5
-
4
-
-
84856043672
-
A mathematical theory of communication
-
623-656, July, October
-
C.E. Shannon, "A Mathematical Theory of Communication", Bell System Technical Journal, vol. 27, pp. 379-423, 623- 656, July, October, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
5
-
-
77950877250
-
So long and no thanks for the externalities: The rationl rejection of security advice by users
-
September 8-11 Oxford, United Kingdom
-
C. Herley, "So Long and No Thanks for the Externalities: The Rationl Rejection of Security Advice by Users." NSPW 09, September 8-11 2009 Oxford, United Kingdom.
-
(2009)
NSPW 09
-
-
Herley, C.1
-
6
-
-
78650009077
-
If your password is 123456 just make it hackme
-
January 20th
-
A. Vance, "If Your Password is 123456 Just Make it HackMe" New York Times, January 20th, 2010. Page A1.
-
(2010)
New York Times
-
-
Vance, A.1
-
7
-
-
85025842571
-
Selecting secure passwords
-
CT-RSA 2007, Proceedings
-
E. R. Verheul. "Selecting secure passwords", CT-RSA 2007, Proceedings Volume 4377 of Lecture Notes in Computer Science, pages 49-66. Springer Verlag, Berlin, 2007.
-
Lecture Notes in Computer Science
, vol.4377
, Issue.2007
, pp. 49-66
-
-
Verheul, E.R.1
-
9
-
-
84872105856
-
-
The OpenWall Group [Software] , [Online Document] [cited 2-19-2010] Available
-
The OpenWall Group, [Software] John the Ripper password cracker, [Online Document] [cited 2-19-2010] Available HTTP http://www.openwall.com
-
John the Ripper Password Cracker
-
-
-
10
-
-
78649991520
-
-
[Online Document] [cited 2010 January 14] Available
-
A list of popular password cracking wordlists, 2005, [Online Document] [cited 2010 January 14] Available HTTP http://www.outpost9.com/files/WordLists. html
-
(2005)
A List of Popular Password Cracking Wordlists
-
-
-
11
-
-
85029593798
-
Cracking 400,000 passwords or how to explain to your roommate why the power-bill is a little high
-
Las Vegas, NV, August
-
M. Weir and S. Aggarwal. "Cracking 400,000 Passwords or How to Explain to Your Roommate why the Power-Bill is a Little High", Defcon 17, Las Vegas, NV, August 2009
-
(2009)
Defcon
, vol.17
-
-
Weir, M.1
Aggarwal, S.2
-
12
-
-
78650031561
-
-
[Online Document] [cited 2010 April 16], Available
-
J. Leversund "The Password Meta Policy" [Online Document] [cited 2010 April 16] Available HTTP http://securitynirvana.blogspot.com/2010/ 02/password-metapolicy.html
-
The Password Meta Policy
-
-
Leversund, J.1
-
13
-
-
84871236752
-
Spelling-error tolerant, order independent pass- phrases via the damerau-levenshtein string-edit distance metric
-
Ballarat, Australia, January 30 - February 02
-
G. Bard, "Spelling-Error Tolerant, Order Independent Pass- Phrases via the Damerau-Levenshtein String-Edit Distance Metric" Fifth Australasian Symposium on ACSW Frontiers - Volume 68 (Ballarat, Australia, January 30 - February 02, 2007), 117-124.
-
(2007)
Fifth Australasian Symposium on ACSW Frontiers
, vol.68
, pp. 117-124
-
-
Bard, G.1
-
14
-
-
65449177711
-
Improving text passwords through persuasion
-
July 23-25, Pittsburgh, PA USA
-
A. Forget, S. Chiasson, P.C. van Oorschot, R. Biddle, "Improving Text Passwords through Persuasion." Symposium on Usable Privacy and Security (SOUPS) 2008, July 23-25, 2008, Pittsburgh, PA USA.
-
(2008)
Symposium on Usable Privacy and Security (SOUPS) 2008
-
-
Forget, A.1
Chiasson, S.2
Van Oorschot, P.C.3
Biddle, R.4
-
16
-
-
78650035112
-
-
[Online Document] [cited 2010 April 16] Available
-
[Online Document] [cited 2010 April 16] Available HTTP http://www.schneier.com/blog/archives/2005/06/write-down-your.html
-
-
-
-
18
-
-
78650027620
-
-
[Online Document] [cited 2010 April 16] Available
-
[Online Document] [cited 2010 April 16] Available HTTP http://forums.crosswalk.com/m-4252083/mpage-1/tm.htm
-
-
-
-
19
-
-
78650003156
-
-
[Online Document] [cited 2010 April 16] Available HTTP
-
B. Ryan, "The Hacking of the http://db.singles.org" [Online Document] [cited 2010 April 16] Available HTTP http://msmvps.com/blogs/ williamryan/archive/2009/02/22/th e-hacking-of-http-db-singles-org.aspx
-
The Hacking of the Http://db.singles.org
-
-
Ryan, B.1
-
20
-
-
70449688216
-
Password cracking using probabilistic context free grammars
-
May
-
M. Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek, "Password Cracking Using Probabilistic Context Free Grammars," Proceedings of the 30th IEEE Symposium on Security and Privacy, May 2009.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
21
-
-
0018543411
-
Password security: A case history
-
R. Morris and K. Thompson. "Password security: a case history" Communications. ACM, 22(11):594-597, 1979.
-
(1979)
Communications. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
22
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
November 7-11, Alexandria, Virginia
-
A. Narayanan and V. Shmatikov, Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff, CCS'05, November 7-11, 2005, Alexandria, Virginia
-
(2005)
CCS'05
-
-
Narayanan, A.1
Shmatikov, V.2
-
23
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password Memorability and Security: Empirical Results. IEEE Security and Privacy Magazine, Volume 2, Number 5, pages 25-31, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
25
-
-
70949098699
-
-
Tech. Rep., April
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," Tech. Rep., April 2009.
-
(2009)
Your Botnet Is My Botnet: Analysis of A Botnet Takeover
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
27
-
-
78650022631
-
-
[cited 2010 July 14] Available
-
[cited 2010 July 14] Available HTTP http://www.sophos.com/pressoffice/ news/articles/2009/03/pa ssword-security.html
-
-
-
-
28
-
-
84994436127
-
Password exhaustion: Predicting the end of password usefulness
-
ICISS
-
L. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor, P. McDaniel and T. Jaeger, "Password Exhaustion: Predicting the End of Password Usefulness" ICISS, volume 4332 of Lecture Notes in Computer Science, pages 37-55, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4332
, pp. 37-55
-
-
Clair, L.1
Johansen, L.2
Enck, W.3
Pirretti, M.4
Traynor, P.5
McDaniel, P.6
Jaeger, T.7
|