-
1
-
-
77954478895
-
-
June
-
Amazon Mechanical Turk. https://www.mturk.com/mturk/, June 2010.
-
(2010)
Amazon Mechanical Turk
-
-
-
3
-
-
77955194191
-
How good are humans at solving CAPTCHAs? A large scale evaluation
-
May
-
E. Bursztein, S. Bethard, J.C. Mitchell, D. Jurafsky, and C. Fabry, "How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation," Proc. IEEE Symp. Security and Privacy, May 2010.
-
(2010)
Proc. IEEE Symp. Security and Privacy
-
-
Bursztein, E.1
Bethard, S.2
Mitchell, J.C.3
Jurafsky, D.4
Fabry, C.5
-
5
-
-
80052801173
-
A usability study and critique of two password managers
-
S. Chiasson, P.C. van Oorschot, and R. Biddle, "A Usability Study and Critique of Two Password Managers," Proc. USENIX Security Symp., pp. 1-16, 2006.
-
(2006)
Proc. USENIX Security Symp.
, pp. 1-16
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
6
-
-
85044211678
-
Do strong web passwords accomplish anything?
-
D. Florencio, C. Herley, and B. Coskun, "Do Strong Web Passwords Accomplish Anything?," Proc. USENIX Workshop Hot Topics in Security (HotSec '07), pp. 1-6, 2007.
-
(2007)
Proc. USENIX Workshop Hot Topics in Security (HotSec '07)
, pp. 1-6
-
-
Florencio, D.1
Herley, C.2
Coskun, B.3
-
7
-
-
85084161244
-
Dos and don'ts of client authentication on the web
-
K. Fu, E. Sit, K. Smith, and N. Feamster, "Dos and Don'ts of Client Authentication on the Web," Proc. USENIX Security Symp., pp. 251-268, 2001.
-
(2001)
Proc. USENIX Security Symp.
, pp. 251-268
-
-
Fu, K.1
Sit, E.2
Smith, K.3
Feamster, N.4
-
9
-
-
78649596599
-
User authentication with provable security against online dictionary attacks
-
May
-
Y. He and Z. Han, "User Authentication with Provable Security against Online Dictionary Attacks," J. Networks, vol. 4, no. 3, pp. 200-207, May 2009.
-
(2009)
J. Networks
, vol.4
, Issue.3
, pp. 200-207
-
-
He, Y.1
Han, Z.2
-
10
-
-
27544460278
-
Remote physical device fingerprinting
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
T. Kohno, A. Broido, and K.C. Claffy, "Remote Physical Device Fingerprinting," Proc. IEEE Symp. Security and Privacy, pp. 211-225, 2005. (Pubitemid 41543657)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
11
-
-
85076285223
-
Re: Captchas understanding CAPTCHA solving services in an economic context
-
M. Motoyama, K. Levchenko, C. Kanich, D. Mccoy, G.M. Voelker, and S. Savage, "Re: CAPTCHAs Understanding CAPTCHASolving Services in an Economic Context," Proc. USENIX Security Symp., Aug. 2010.
-
(2010)
Proc. USENIX Security Symp., Aug.
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
12
-
-
33846422436
-
Mitigating dictionary attacks with text-graphics character CAPTCHAs
-
DOI 10.1093/ietfec/e90-a.1.179
-
C. Namprempre and M.N. Dailey, "Mitigating Dictionary Attacks with Text-Graphics Character Captchas," IEICE Trans. Fundamentals of Electronics, Comm. and Computer Sciences, vol. E90-A, no. 1, pp. 179-186, 2007. (Pubitemid 46145220)
-
(2007)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E90-A
, Issue.1
, pp. 179-186
-
-
Namprempre, C.1
Dailey, M.N.2
-
13
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
DOI 10.1145/1102120.1102168, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
A. Narayanan and V. Shmatikov, "Fast Dictionary Attacks on Human-Memorable Passwords Using Time-Space Tradeoff," Proc. ACM Computer and Comm. Security (CCS '05), pp. 364-372, Nov. 2005. (Pubitemid 44022019)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
14
-
-
81455150980
-
Nat'l Inst. of standards and technology (NIST)
-
Sept.
-
Nat'l Inst. of Standards and Technology (NIST), Hashbelt. http://www.itl.nist.gov/div897/sqg/dads/HTML/hashbelt.html, Sept. 2010.
-
(2010)
Hashbelt
-
-
-
15
-
-
81455139057
-
The biggest cloud on the planet is owned by . the Crooks
-
Mar.
-
"The Biggest Cloud on the Planet Is Owned by . the Crooks," NetworkWorld.com., http://www.networkworld.com/community/node/58829, Mar. 2010.
-
(2010)
NetworkWorld.com.
-
-
-
18
-
-
36049038314
-
Profiling attacker behavior following SSH compromises
-
DOI 10.1109/DSN.2007.76, 4272962, Proceedings - 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007
-
D. Ramsbrock, R. Berthier, and M. Cukier, "Profiling Attacker Behavior following SSH Compromises," Proc. 37th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN '07), pp. 119-124, June 2007. (Pubitemid 350080416)
-
(2007)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 119-124
-
-
Ramsbrock, D.1
Berthier, R.2
Cukier, M.3
-
19
-
-
81455129718
-
Important information: Distributed SSH brute force attacks
-
SANS.org June
-
SANS.org, "Important Information: Distributed SSH Brute Force Attacks," SANS Internet Storm Center Handler's Diary, http://isc.sans.edu/ diary.html?storyid=9034, June 2010.
-
(2010)
SANS Internet Storm Center Handler's Diary
-
-
-
20
-
-
81455156544
-
The top cyber security risks
-
Sept.
-
"The Top Cyber Security Risks," SANS.org, http://www.sans. org/top-cyber-security-risks/, Sept. 2009.
-
(2009)
SANS.org
-
-
-
22
-
-
81455156543
-
Botnet pierces microsoft live through audio captchas
-
Mar.
-
"Botnet Pierces Microsoft Live through Audio Captchas," TheRegister.co.uk, http://www.theregister.co.uk/2010/03/22/microsoft-live- captcha-by pass/, Mar. 2010.
-
(2010)
TheRegister.co.uk
-
-
-
23
-
-
33750906057
-
On countering online dictionary attacks with login histories and humans-in-the-loop
-
DOI 10.1145/1178618.1178619
-
P.C. van Oorschot and S. Stubblebine, "On Countering Online Dictionary Attacks with Login Histories and Humans-in-the-Loop," ACM Trans. Information and System Security, vol. 9, no. 3, pp. 235-258, 2006. (Pubitemid 44728674)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.3
, pp. 235-258
-
-
Van Oorschot, P.C.1
Stubblebine, S.2
-
24
-
-
35248831179
-
CAPTCHA: Using hard ai problems for security
-
May
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using Hard AI Problems for Security," Proc. Eurocrypt, pp. 294-311, May 2003.
-
(2003)
Proc. Eurocrypt
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
25
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern, "Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords," Proc. 17th ACM Conf. Computer and Comm. Security, pp. 162-175, 2010.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
26
-
-
36949011812
-
How dynamic are IP addresses?
-
DOI 10.1145/1282380.1282415, ACM SIGCOMM 2007: Conference on Computer Communications
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber, "How Dynamic Are IP Addresses?," SIGCOMM Computer Comm. Rev., vol. 37, no. 4, pp. 301-312, 2007. (Pubitemid 350239793)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 301-312
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
|