-
2
-
-
0016081584
-
Protection and the Control of Information Sharing in Multics
-
J. H. Saltzer, "Protection and the Control of Information Sharing in Multics," Commun. ACM, vol. 17, pp. 388-402, 1974.
-
(1974)
Commun. ACM
, vol.17
, pp. 388-402
-
-
Saltzer, J.H.1
-
3
-
-
0018543411
-
Password Security: A Case History
-
R. Morris and K. Thompson, "Password Security: A Case History," Commun. ACM, vol. 22, no. 11, pp. 594-597, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
6
-
-
77955329590
-
-
December [Online]. Available
-
B. Schneier, "Real-World Passwords," December 2006. [Online]. Available: www.schneier.com/blog/archives/2006/12/realworld-passw.html
-
(2006)
Real-World Passwords
-
-
Schneier, B.1
-
9
-
-
0024683697
-
Password Cracking: A Game of Wits
-
D. Seeley, "Password Cracking: A Game of Wits," Commun. ACM, vol. 32, pp. 700-703, 1989.
-
(1989)
Commun. ACM
, vol.32
, pp. 700-703
-
-
Seeley, D.1
-
10
-
-
84877943706
-
-
"John the Ripper," http://www.openwall.com/john/.
-
John the Ripper
-
-
-
14
-
-
85001728633
-
Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times
-
J. A. Cazier and B. D. Medlin, "Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times." Information Systems Security, vol. 15, no. 6, pp. 45-55, 2006.
-
(2006)
Information Systems Security
, vol.15
, Issue.6
, pp. 45-55
-
-
Cazier, J.A.1
Medlin, B.D.2
-
15
-
-
0024768109
-
Passwords in use in a university timesharing environment
-
B. L. Riddle, M. S. Miron, and J. A. Semo, "Passwords in use in a university timesharing environment," Computers and Security, vol. 8, no. 7, pp. 569-578, 1989.
-
(1989)
Computers and Security
, vol.8
, Issue.7
, pp. 569-578
-
-
Riddle, B.L.1
Miron, M.S.2
Semo, J.A.3
-
18
-
-
0033277446
-
Password security: An empirical study
-
M. Zviran and W. J. Haga, "Password security: an empirical study," Journal of Management Information Systems, vol. 15, no. 4, pp. 161-185, 1999.
-
(1999)
Journal of Management Information Systems
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.J.2
-
23
-
-
84870795633
-
-
Carnegie Mellon University, Tech. Rep. CMU-CyLab-11-008
-
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, and J. Lopez, "Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms," Carnegie Mellon University, Tech. Rep. CMU-CyLab-11-008, 2011.
-
(2011)
Guess Again (And Again and Again): Measuring Password Strength by Simulating Password-cracking Algorithms
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
24
-
-
12844275960
-
Password Memorability and Security: Empirical Results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," IEEE Security and Privacy Magazine, vol. 2, no. 5, pp. 25-34, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.5
, pp. 25-34
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
25
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
ACM
-
th ACM Conference on Computer and Communications Security. ACM, 2009, pp. 635-647.
-
(2009)
th ACM Conference on Computer and Communications Security
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
26
-
-
84940644968
-
A Mathematical Theory of Communication
-
C. E. Shannon, "A Mathematical Theory of Communication," in Bell System Technical Journal, vol. 7, 1948, pp. 379-423.
-
(1948)
Bell System Technical Journal
, vol.7
, pp. 379-423
-
-
Shannon, C.E.1
-
28
-
-
35048812577
-
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks
-
J. O. Pliam, "On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks," in Progress in Cryptology-INDOCRYPT 2000, 2000.
-
(2000)
Progress in Cryptology-INDOCRYPT 2000
-
-
Pliam, J.O.1
-
29
-
-
77955315457
-
-
Department of Mathematics, Royal Melbourne Institute of Technology, Tech. Rep. 6
-
S. Boztas, "Entropies, Guessing, and Cryptography," Department of Mathematics, Royal Melbourne Institute of Technology, Tech. Rep. 6, 1999.
-
(1999)
Entropies, Guessing, and Cryptography
-
-
Boztas, S.1
-
32
-
-
84980082105
-
Transmission of Information
-
R. V. Hartley, "Transmission of Information," Bell System Technical Journal, vol. 7, no. 3, pp. 535-563, 1928.
-
(1928)
Bell System Technical Journal
, vol.7
, Issue.3
, pp. 535-563
-
-
Hartley, R.V.1
-
35
-
-
2342553334
-
"Ten strikes and you're out": Increasing the number of login attempts can improve password usability
-
John Wiley
-
S. Brostoff and A. Sasse, ""Ten strikes and you're out": Increasing the number of login attempts can improve password usability," in Proceedings of CHI 2003 Workshop on HCI and Security Systems. John Wiley, 2003.
-
(2003)
Proceedings of CHI 2003 Workshop on HCI and Security Systems
-
-
Brostoff, S.1
Sasse, A.2
-
37
-
-
81455139721
-
Revisiting Defenses Against Large-Scale Online Password Guessing Attacks
-
M. Alsaleh, M. Mannan, and P. van Oorschot, "Revisiting Defenses Against Large-Scale Online Password Guessing Attacks," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 1, pp. 128-141, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.1
, pp. 128-141
-
-
Alsaleh, M.1
Mannan, M.2
Van Oorschot, P.3
-
44
-
-
65549085067
-
Power-Law Distributions in Empirical Data
-
A. Clauset, C. R. Shalizi, and M. E. J. Newman, "Power-Law Distributions in Empirical Data," SIAM Rev., vol. 51, pp. 661-703, 2009.
-
(2009)
SIAM Rev.
, vol.51
, pp. 661-703
-
-
Clauset, A.1
Shalizi, C.R.2
Newman, M.E.J.3
-
48
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "PassPoints: design and longitudinal evaluation of a graphical password system," International Journal of Human-Computer Studies, vol. 63, pp. 102-127, 2005. (Pubitemid 40753495)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
|