메뉴 건너뛰기




Volumn , Issue , 2012, Pages 301-310

Investigating the distribution of password choices

Author keywords

Dictionary attack; Distribution; Passwords; Zipf

Indexed keywords

DICTIONARY ATTACK; DISTRIBUTION; HIGH FREQUENCY HF; PASSWORD CRACKING; PASSWORDS; SITE SECURITY; ZIPF; ZIPF'S LAW;

EID: 84860859593     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2187836.2187878     Document Type: Conference Paper
Times cited : (105)

References (16)
  • 1
    • 0038234347 scopus 로고    scopus 로고
    • Zipf, power-laws, and pareto-A ranking tutorial
    • L. A. Adamic. Zipf, power-laws, and pareto-a ranking tutorial. Xerox Palo Alto Research Center, http://www.hpl.hp.com/research/idl/papers/ranking/ ranking.html, 2000.
    • (2000) Xerox Palo Alto Research Center
    • Adamic, L.A.1
  • 2
    • 0029732887 scopus 로고    scopus 로고
    • An inequality on guessing and its application to sequential decoding
    • Janurary
    • E. Arikan. An inequality on guessing and its application to sequential decoding. IEEE Transactions on Information Theory, 42, Janurary 1996.
    • (1996) IEEE Transactions on Information Theory , vol.42
    • Arikan, E.1
  • 3
    • 65549085067 scopus 로고    scopus 로고
    • Power-law distributions in empirical data
    • A. Clauset, C. Shalizi, and M. Newman. Power-law distributions in empirical data. SIAM review, 51(4):661-703, 2009.
    • (2009) SIAM Review , vol.51 , Issue.4 , pp. 661-703
    • Clauset, A.1    Shalizi, C.2    Newman, M.3
  • 4
    • 77953306210 scopus 로고    scopus 로고
    • Password strength: An empirical analysis
    • M. Dell'Amico, P. Michiardi, and Y. Roudier. Password strength: An empirical analysis. In INFOCOM, pages 1-9, 2010.
    • (2010) INFOCOM , pp. 1-9
    • Dell'amico, M.1    Michiardi, P.2    Roudier, Y.3
  • 6
    • 77956890234 scopus 로고
    • Monte carlo sampling methods using markov chains and their applications
    • W. Hastings. Monte carlo sampling methods using markov chains and their applications. Biometrika, 57(1):97, 1970.
    • (1970) Biometrika , vol.57 , Issue.1 , pp. 97
    • Hastings, W.1
  • 7
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: The rational rejection of security advice by users
    • ACM
    • C. Herley. So long, and no thanks for the externalities: the rational rejection of security advice by users. In Proceedings of the 2009 workshop on New security paradigms, pages 133-144. ACM, 2009.
    • (2009) Proceedings of the 2009 Workshop on New Security Paradigms , pp. 133-144
    • Herley, C.1
  • 13
    • 24844450736 scopus 로고    scopus 로고
    • The disparity between work and entropy in cryptology
    • J. O. Pliam. The disparity between work and entropy in cryptology. Theory of Cryptography Library: Record, pages 98-24, 1998.
    • (1998) Theory of Cryptography Library: Record , pp. 24-98
    • Pliam, J.O.1
  • 14
    • 0029714667 scopus 로고    scopus 로고
    • Unified login with pluggable authentication modules (PAM)
    • V. Samar. Unified login with pluggable authentication modules (PAM). In Proc. CCS'96, pages 1-10, 1996.
    • (1996) Proc. CCS'96 , pp. 1-10
    • Samar, V.1
  • 15
    • 85071080463 scopus 로고    scopus 로고
    • Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
    • S. Schechter, C. Herley, and M. Mitzenmacher. Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks. In Proc. HotSec'10, pages 1-6, 2010.
    • (2010) Proc. HotSec'10 , pp. 1-6
    • Schechter, S.1    Herley, C.2    Mitzenmacher, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.