-
1
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
August
-
A. Evans, Jr., W. Kantrowitz, and E. Weiss. A user authentication scheme not requiring secrecy in the computer. Commun. ACM, 17(8):437-442, August 1974.
-
(1974)
Commun. ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans Jr., A.1
Kantrowitz, W.2
Weiss, E.3
-
2
-
-
0028446389
-
On fortifying key negotiation schemes with poorly chosen passwords
-
R. J. Anderson and T.M.A. Lomas. On fortifying key negotiation schemes with poorly chosen passwords. Electronics Letters, 30(13):1040-1041, 1994.
-
(1994)
Electronics Letters
, vol.30
, Issue.13
, pp. 1040-1041
-
-
Anderson, R.J.1
Lomas, T.M.A.2
-
4
-
-
24244467065
-
-
Technical Report SRI-CSL-94-08, SRI International Laboratory, (revised 2 Sept. 1994).
-
T. A. Berson, L. Gong, and T.M.A. Lomas. Secure, keyed, and collisionful hash functions. Technical Report SRI-CSL-94-08, SRI International Laboratory, 1993 (revised 2 Sept. 1994).
-
(1993)
Secure, Keyed, and Collisionful Hash Functions.
-
-
Berson, T.A.1
Gong, L.2
Lomas, T.M.A.3
-
5
-
-
84865622599
-
-
In WWW
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW, pages 551-560, 2009.
-
(2009)
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
6
-
-
78049362318
-
Kamouflage: Loss-resistant password management
-
H. Bojinov, E. Bursztein, X. Boyen, and D. Boneh. Kamouflage: loss-resistant password management. In ESORICS, pages 286-302, 2010.
-
(2010)
ESORICS
, pp. 286-302
-
-
Bojinov, H.1
Bursztein, E.2
Boyen, X.3
Boneh, D.4
-
8
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In IEEE Symposium on Security and Privacy, pages 538-552, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 538-552
-
-
Bonneau, J.1
-
10
-
-
84885891904
-
Baiting inside attackers using decoy documents
-
B. M. Bowen, S. Hershkop, A. D. Keromytis, and S. J. Stolfo. Baiting inside attackers using decoy documents. In SecureComm, pages 51-70, 2009.
-
(2009)
SecureComm
, pp. 51-70
-
-
Bowen, B.M.1
Hershkop, S.2
Keromytis, A.D.3
Stolfo, S.J.4
-
11
-
-
33646717563
-
A new two-server approach for authentication with short secrets
-
J. Brainard, A. Juels, B. Kaliski, and M. Szydlo. A new two-server approach for authentication with short secrets. In USENIX Security, pages 201-214, 2003.
-
(2003)
USENIX Security
, pp. 201-214
-
-
Brainard, J.1
Juels, A.2
Kaliski, B.3
Szydlo, M.4
-
12
-
-
84869417078
-
Practical yet universally composable two-server password-authenticated secret sharing
-
J. Camenisch, A. Lysyanskaya, and G. Neven. Practical yet universally composable two-server password-authenticated secret sharing. In ACM CCS, pages 525-536, 2012.
-
(2012)
ACM CCS
, pp. 525-536
-
-
Camenisch, J.1
Lysyanskaya, A.2
Neven, G.3
-
13
-
-
84873691773
-
Rethinking passwords
-
Feb.
-
William Cheswick. Rethinking passwords. Comm. ACM, 56(2):40-44, Feb. 2013.
-
(2013)
Comm. ACM
, vol.56
, Issue.2
, pp. 40-44
-
-
Cheswick, W.1
-
14
-
-
77952108748
-
The use of deception techniques: Honeypots and decoys
-
H. Bidgoli, editor, Wiley and Sons
-
F. Cohen. The use of deception techniques: Honeypots and decoys. In H. Bidgoli, editor, Handbook of Information Security, volume 3, pages 646-655. Wiley and Sons, 2006.
-
(2006)
Handbook of Information Security
, vol.3
, pp. 646-655
-
-
Cohen, F.1
-
15
-
-
84888986727
-
-
EMC Corp.
-
EMC Corp. RSA Distributed Credential Protection. http://www.emc.com/ security/rsa-distributed-credential-protection.htm, 2013.
-
(2013)
RSA Distributed Credential Protection.
-
-
-
16
-
-
84869430752
-
Strengthening user authentication through opportunistic cryptographic identity assertions
-
A. Czeskis, M. Dietz, T. Kohno, D. Wallach, and D. Balfanz. Strengthening user authentication through opportunistic cryptographic identity assertions. In ACM CCS, pages 404-414, 2012.
-
(2012)
ACM CCS
, pp. 404-414
-
-
Czeskis, A.1
Dietz, M.2
Kohno, T.3
Wallach, D.4
Balfanz, D.5
-
18
-
-
65449177711
-
Improving text passwords through persuasion
-
A. Forget, S. Chiasson, P. C. van Oorschot, and R. Biddle. Improving text passwords through persuasion. In SOUPS, pages 1-12, 2008.
-
(2008)
SOUPS
, pp. 1-12
-
-
Forget, A.1
Chiasson, S.2
Van Oorschot, P.C.3
Biddle, R.4
-
19
-
-
84889004499
-
LinkedIn, Last.Fm, now Yahoo? Don't ignore news of a password breach
-
13 July
-
C. Gaylord. LinkedIn, Last.fm, now Yahoo? don't ignore news of a password breach. Christian Science Monitor, 13 July 2012.
-
(2012)
Christian Science Monitor
-
-
Gaylord, C.1
-
20
-
-
84889051838
-
50 million compromised in Evernote hack
-
4 March
-
D. Gross. 50 million compromised in Evernote hack. CNN, 4 March 2013.
-
(2013)
CNN
-
-
Gross, D.1
-
21
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
C. Herley and P. Van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 10(1):28-36, 2012.
-
(2012)
IEEE Security & Privacy
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.2
-
22
-
-
84872105946
-
Building better passwords using probabilistic techniques
-
S. Houshmand and S. Aggarwal. Building better passwords using probabilistic techniques. In ACSAC, pages 109-118, 2012.
-
(2012)
ACSAC
, pp. 109-118
-
-
Houshmand, S.1
Aggarwal, S.2
-
23
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
P.G. Kelley, S. Komanduri, M.L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L.F. Cranor, and J. Lopez. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In IEEE Symposium on Security and Privacy (SP), pages 523-537, 2012.
-
(2012)
IEEE Symposium on Security and Privacy (SP)
, pp. 523-537
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
24
-
-
84889050539
-
Innovator: Ramesh Kesanupalli's biometric passwords stored on devices
-
28 March
-
O. Kharif. Innovator: Ramesh Kesanupalli's biometric passwords stored on devices. Bloomberg Businessweek, 28 March 2013.
-
(2013)
Bloomberg Businessweek
-
-
Kharif, O.1
-
25
-
-
84888994336
-
-
Microsoft TechNet Library. Referenced March 2012 at
-
Microsoft TechNet Library. Password must meet complexity requirements. Referenced March 2012 at http://bit.ly/YAsGiZ.
-
Password Must Meet Complexity Requirements.
-
-
-
26
-
-
0018543411
-
Password security: A case history
-
November
-
R. Morris and K. Thompson. Password security: a case history. Commun. ACM, 22(11):594-597, November 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
28
-
-
84889054857
-
H.R. 624: The Cyber Intelligence Sharing and Protection Act of 2013
-
U.S. House of Representatives.
-
U.S. House of Representatives. H.R. 624: The Cyber Intelligence Sharing and Protection Act of 2013. 113th Cong., 2013.
-
(2013)
113th Cong
-
-
-
29
-
-
84888994121
-
LinkedIn admits site hack, adds pinch of salt to passwords
-
7 June
-
B.-A. Parnell. LinkedIn admits site hack, adds pinch of salt to passwords. The Register, 7 June 2012.
-
(2012)
The Register
-
-
Parnell, B.-A.1
-
30
-
-
84888999085
-
Update: LinkedIn confirms account passwords hacked
-
6 June
-
I. Paul. Update: LinkedIn confirms account passwords hacked. PC World, 6 June 2012.
-
(2012)
PC World
-
-
Paul, I.1
-
31
-
-
79961201365
-
How unique and traceable are usernames?
-
D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manils. How unique and traceable are usernames? In Privacy Enhancing Technologies, pages 1-17, 2011.
-
(2011)
Privacy Enhancing Technologies
, pp. 1-17
-
-
Perito, D.1
Castelluccia, C.2
Kaafar, M.A.3
Manils, P.4
-
32
-
-
84902231625
-
Hackers in China attacked The Times for last 4 months
-
31 January
-
N. Perlroth. Hackers in China attacked The Times for last 4 months. New York Times, page A1, 31 January 2013.
-
(2013)
New York Times
-
-
Perlroth, N.1
-
33
-
-
0016090968
-
A high security log-in procedure
-
August
-
G. B. Purdy. A high security log-in procedure. Commun. ACM, 17(8):442-445, August 1974.
-
(1974)
Commun. ACM
, vol.17
, Issue.8
, pp. 442-445
-
-
Purdy, G.B.1
-
34
-
-
84889074953
-
Data and system security with failwords
-
U.S. Patent Application US2006/0161786A1, U.S. Patent Office, July 20
-
Shrisha Rao. Data and system security with failwords. U.S. Patent Application US2006/0161786A1, U.S. Patent Office, July 20, 2006. http://www.google.com/patents/US20060161786.
-
(2006)
-
-
Rao, S.1
-
35
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J.C. Mitchell. Stronger password authentication using browser extensions. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
36
-
-
70449688213
-
It's no secret. Measuring the security and reliability of authentication "secret" questions
-
S. Schechter, A. J. B. Brush, and S. Egelman. It's no secret. measuring the security and reliability of authentication "secret" questions. In IEEE Symposium on Security and Privacy (SP), pages 375-390, 2009.
-
(2009)
IEEE Symposium on Security and Privacy (SP)
, pp. 375-390
-
-
Schechter, S.1
Brush, A.J.B.2
Egelman, S.3
-
37
-
-
85071080463
-
Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
-
S. Schechter, C. Herley, and M. Mitzenmacher. Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks. In USENIX HotSec, pages 1-8, 2010.
-
(2010)
USENIX HotSec
, pp. 1-8
-
-
Schechter, S.1
Herley, C.2
Mitzenmacher, M.3
-
38
-
-
0013197874
-
Observations on reusable password choices
-
E. Spafford. Observations on reusable password choices. In USENIX Security, 1992.
-
(1992)
USENIX Security
-
-
Spafford, E.1
-
40
-
-
84889075958
-
Why your next phone will include fingerprint, facial, and voice recognition
-
March
-
T. Wadhwa. Why your next phone will include fingerprint, facial, and voice recognition. Forbes, 29 March 2013.
-
(2013)
Forbes
, pp. 29
-
-
Wadhwa, T.1
-
41
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek. Password cracking using probabilistic context-free grammars. In IEEE Symposium on Security and Privacy (SP), pages 162-175, 2009.
-
(2009)
IEEE Symposium on Security and Privacy (SP)
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
42
-
-
15944397574
-
Honeyfiles: Deceptive files for intrusion detection
-
J. Yuill, M. Zappe, D. Denning, and F. Feer. Honeyfiles: deceptive files for intrusion detection. In Information Assurance Workshop, pages 116-122, 2004.
-
(2004)
Information Assurance Workshop
, pp. 116-122
-
-
Yuill, J.1
Zappe, M.2
Denning, D.3
Feer, F.4
-
43
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: an algorithmic framework and empirical analysis. In ACM CCS, pages 176-186, 2010.
-
(2010)
ACM CCS
, pp. 176-186
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
|