-
1
-
-
84874867626
-
-
Advanced Encryption Standard (AES)
-
Advanced Encryption Standard (AES). In NIST FIPS 197, 2001.
-
(2001)
NIST FIPS
, vol.197
-
-
-
2
-
-
84874834080
-
The CCM mode for authentication and confidentiality
-
The CCM Mode for Authentication and Confidentiality. In NIST SP 800-38C, 2004.
-
(2004)
NIST SP 800-38C
-
-
-
5
-
-
0043232732
-
Users are not the enemy
-
A. Adams and M. A. Sasse. Users are not the enemy. Commun. ACM, 42(12):40-46, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
6
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
7
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
-
J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proc. of IEEE S&P, 2012.
-
(2012)
Proc. of IEEE S&P
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Stajano, F.4
-
8
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In Proc. of CCS, 2009.
-
(2009)
Proc. of CCS
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
9
-
-
85071440512
-
Halting password puzzles: Hard-to-break encryption from human-memorable keys
-
X. Boyen. Halting password puzzles: hard-to-break encryption from human-memorable keys. In Proc. of USENIX Security Symposium, 2007.
-
(2007)
Proc. of USENIX Security Symposium
-
-
Boyen, X.1
-
13
-
-
35348884906
-
A large-scale study of web password habits
-
D. Florêncio and C. Herley. A large-scale study of web password habits. In Proc. of WWW, 2007.
-
(2007)
Proc. of WWW
-
-
Florêncio, D.1
Herley, C.2
-
14
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proc. of USENIX Security Symposium, 2008.
-
(2008)
Proc. of USENIX Security Symposium
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
16
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
C. Herley and P. C. van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 10(1):28-36, 2012.
-
(2012)
IEEE Security & Privacy
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.C.2
-
18
-
-
39049086327
-
Back to the future: A framework for automatic malware removal and system repair
-
F. Hsu, H. Chen, T. Ristenpart, J. Li, and Z. Su. Back to the future: A framework for automatic malware removal and system repair. In Proc. of ACSAC, 2006.
-
(2006)
Proc. of ACSAC
-
-
Hsu, F.1
Chen, H.2
Ristenpart, T.3
Li, J.4
Su, Z.5
-
21
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, and J. Lopez. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proc. of IEEE S&P, 2012.
-
(2012)
Proc. of IEEE S&P
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
22
-
-
84874875222
-
Of passwords and people: Measuring the effect of password-composition policies
-
S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman. Of passwords and people: Measuring the effect of password-composition policies. In Proc. of CHI, 2011.
-
(2011)
Proc. of CHI
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
23
-
-
0033719386
-
Risks of the passport single signon protocol
-
D. P. Kormann and A. D. Rubin. Risks of the passport single signon protocol. Comput. Networks, 33(1-6):51-58, 2000.
-
(2000)
Comput. Networks
, vol.33
, Issue.1-6
, pp. 51-58
-
-
Kormann, D.P.1
Rubin, A.D.2
-
24
-
-
0018543411
-
Password security: A case history
-
R. Morris and K. Thompson. Password security: a case history. Commun. ACM, 22(11):594-597, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
25
-
-
85032616916
-
Enabling security in cloud storage slas with cloudproof
-
R. A. Popa, J. Lorch, D. Molnar, H. J. Wang, and L. Zhuang. Enabling security in cloud storage slas with cloudproof. In Proc. of USENIX ATC, 2011.
-
(2011)
Proc. of USENIX ATC
-
-
Popa, R.A.1
Lorch, J.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
28
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In Proc. of USENIX Security Symposium, 2005.
-
(2005)
Proc. of USENIX Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
30
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. A. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. In Proc. of CCS, 2009.
-
(2009)
Proc. of CCS
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.A.6
Kruegel, C.7
Vigna, G.8
-
31
-
-
78751558943
-
A billion keys, but few locks: The crisis of web single sign-on
-
S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov. A billion keys, but few locks: the crisis of web single sign-on. In Proc. of NSPW, pages 61-72, 2010.
-
(2010)
Proc. of NSPW
, pp. 61-72
-
-
Sun, S.-T.1
Boshmaf, Y.2
Hawkey, K.3
Beznosov, K.4
-
33
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proc. of NDSS, 2006.
-
(2006)
Proc. of NDSS
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.T.7
-
34
-
-
34250786200
-
Web wallet: Preventing phishing attacks by revealing user intentions
-
M. Wu, R. C. Miller, and G. Little. Web wallet: preventing phishing attacks by revealing user intentions. In Proc. of SOUPS, pages 102-113, 2006.
-
(2006)
Proc. of SOUPS
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
-
35
-
-
85180527787
-
The secure remote password protocol
-
T. Wu. The secure remote password protocol. In Proc. of NDSS, 1998.
-
(1998)
Proc. of NDSS
-
-
Wu, T.1
-
36
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results. IEEE Security and Privacy, 2(5):25-31, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
37
-
-
0242708748
-
A note on proactive password checking
-
J. J. Yan. A note on proactive password checking. In Proc. of NSPW, pages 127-135, 2001.
-
(2001)
Proc. of NSPW
, pp. 127-135
-
-
Yan, J.J.1
-
38
-
-
34250747969
-
Passpet: Convenient password management and phishing protection
-
K.-P. Yee and K. Sitaker. Passpet: convenient password management and phishing protection. In Proc. of SOUPS, pages 32-43, 2006.
-
(2006)
Proc. of SOUPS
, pp. 32-43
-
-
Yee, K.-P.1
Sitaker, K.2
-
39
-
-
84874835343
-
Preventing the revealing of online passwords to inappropriate websites with LoginInspector
-
C. Yue. Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector. In Proc. of USENIX LISA, 2012.
-
(2012)
Proc. of USENIX LISA
-
-
Yue, C.1
-
40
-
-
77953587426
-
BogusBiter: A transparent protection against phishing attacks
-
C. Yue and H. Wang. BogusBiter: A Transparent Protection Against Phishing Attacks. ACM Transactions on Internet Technology, 10(2):1-31, 2010.
-
(2010)
ACM Transactions on Internet Technology
, vol.10
, Issue.2
, pp. 1-31
-
-
Yue, C.1
Wang, H.2
|