메뉴 건너뛰기




Volumn 8270 LNCS, Issue PART 2, 2013, Pages 361-380

Naturally rehearsing passwords

Author keywords

Chinese Remainder Theorem; Password Management Scheme; Security Model; Sufficient Rehearsal Assumption; Usability Model; Visitation Schedule

Indexed keywords

CHINESE REMAINDER THEOREM; PASSWORD MANAGEMENT; SECURITY MODEL; SUFFICIENT REHEARSAL ASSUMPTION; USABILITY MODELING;

EID: 84892375701     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-42045-0_19     Document Type: Conference Paper
Times cited : (28)

References (61)
  • 1
    • 84892383316 scopus 로고    scopus 로고
    • retrieved October 22
    • Amazon ec2 pricing, http://aws.amazon.com/ec2/pricing/ (retrieved October 22, 2012)
    • (2012)
  • 3
    • 84892403439 scopus 로고    scopus 로고
    • July (retrieved September 27, 2012)
    • Geek to live: Choose (and remember) great passwords (July 2006), http://lifehacker.com/184773/geek-to-live-choose-and-remember-great-passwords (retrieved September 27, 2012)
    • (2006) Geek to Live: Choose (And Remember) Great Passwords
  • 4
    • 84919487087 scopus 로고    scopus 로고
    • December (retrieved September 27, 2012)
    • Rockyou hack: From bad to worse (December 2009), http://techcrunch.com/ 2009/12/14/rockyou-hack-security-myspace-facebook-passwords/ (retrieved September 27, 2012)
    • (2009) Rockyou Hack: From Bad to Worse
  • 5
    • 84892382024 scopus 로고    scopus 로고
    • April (retrieved August 18, 2011)
    • Oh man, what a day! an update on our security breach (April 2010), http://blogs.atlassian.com/news/2010/04/oh-man-what-a-day-an-update-on-our- security-breach.html (retrieved August 18, 2011)
    • (2010) Oh Man, What a Day! An Update on Our Security Breach
  • 6
    • 84892416879 scopus 로고    scopus 로고
    • May (retrieved September 9, 2012)
    • Sarah palin vs the hacker (May 2010), http://www.telegraph.co.uk/news/ worldnews/sarah-palin/7750050/Sarah-Palin-vs-the-hacker.html (retrieved September 9, 2012)
    • (2010) Sarah Palin Vs the Hacker
  • 7
    • 84892425709 scopus 로고    scopus 로고
    • June (retrieved August 16, 2011)
    • Nato site hacked (June 2011), http://www.theregister.co.uk/2011/06/24/ nato-hack-attack/ (retrieved August 16, 2011)
    • (2011) Nato Site Hacked
  • 8
    • 84888996876 scopus 로고    scopus 로고
    • April (retrieved May 22, 2012)
    • Update on playstation network/qriocity services (April 2011), http://blog.us.playstation.com/2011/04/22/update-on-playstation-network- qriocity-services/ (retrieved May 22, 2012)
    • (2011) Update on Playstation Network/qriocity Services
  • 11
    • 84889000718 scopus 로고    scopus 로고
    • June (retrieved September 27, 2012)
    • An update on linkedin member passwords compromised (June 2012), http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/ (retrieved September 27, 2012)
    • (2012) An Update on Linkedin Member Passwords Compromised
  • 12
    • 84889074898 scopus 로고    scopus 로고
    • January (retrieved May 22, 2012)
    • Zappos customer accounts breached (January 2012), http://www.usatoday. com/tech/news/story/2012-01-16/mark-smith-zappos-breach-tips/52593484/1 (retrieved May 22, 2012)
    • (2012) Zappos Customer Accounts Breached
  • 13
    • 77049099362 scopus 로고    scopus 로고
    • Imagined communities: Awareness, information sharing, and privacy on the facebook
    • Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
    • Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36-58. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4258 , pp. 36-58
    • Acquisti, A.1    Gross, R.2
  • 14
    • 0031368613 scopus 로고    scopus 로고
    • Act-r: A theory of higher level cognition and its relation to visual attention
    • Anderson, J., Matessa, M., Lebiere, C.: Act-r: A theory of higher level cognition and its relation to visual attention. Human-Computer Interaction 12(4), 439-462 (1997)
    • (1997) Human-Computer Interaction , vol.12 , Issue.4 , pp. 439-462
    • Anderson, J.1    Matessa, M.2    Lebiere, C.3
  • 15
    • 84970188424 scopus 로고
    • Reflections of the environment in memory
    • Anderson, J.R., Schooler, L.J.: Reflections of the environment in memory. Psychological Science 2(6), 396-408 (1991)
    • (1991) Psychological Science , vol.2 , Issue.6 , pp. 396-408
    • Anderson, J.R.1    Schooler, L.J.2
  • 17
    • 0003945622 scopus 로고    scopus 로고
    • Human memory: Theory and practice
    • Baddeley, A.: Human memory: Theory and practice. Psychology Pr. (1997)
    • (1997) Psychology Pr.
    • Baddeley, A.1
  • 18
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - how to sign with RSA and rabin
    • Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399-416. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 21
    • 84892407226 scopus 로고    scopus 로고
    • Naturally rehearsing passwords
    • abs/1302.5122
    • Blocki, J., Blum, M., Datta, A.: Naturally rehearsing passwords. CoRR abs/1302.5122 (2013)
    • (2013) CoRR
    • Blocki, J.1    Blum, M.2    Datta, A.3
  • 24
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • IEEE
    • Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 538-552. IEEE (2012)
    • (2012) 2012 IEEE Symposium on Security and Privacy (SP) , pp. 538-552
    • Bonneau, J.1
  • 25
    • 84878353718 scopus 로고    scopus 로고
    • The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
    • IEEE
    • Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on Security and Privacy, pp. 553-567. IEEE (2012)
    • (2012) IEEE Symposium on Security and Privacy , pp. 553-567
    • Bonneau, J.1    Herley, C.2    Van Oorschot, P.C.3    Stajano, F.4
  • 26
    • 77955315457 scopus 로고    scopus 로고
    • Department of Mathematics, Royal Melbourne Institute of Technology, Tech. Rep 6
    • Boztas, S.: Entropies, guessing, and cryptography. Department of Mathematics, Royal Melbourne Institute of Technology, Tech. Rep 6 (1999)
    • (1999) Entropies, Guessing, and Cryptography
    • Boztas, S.1
  • 27
    • 84892417752 scopus 로고    scopus 로고
    • Department of defense password management guideline
    • Brand, S. Department of defense password management guideline
    • Brand, S.1
  • 30
    • 84892385232 scopus 로고    scopus 로고
    • Consumer password worst practices
    • Center, I.: Consumer password worst practices. Imperva (White Paper) (2010)
    • (2010) Imperva (White Paper)
    • Center, I.1
  • 36
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 40
    • 0015083717 scopus 로고
    • Simple memory: A theory for archicortex
    • Philosophical Transactions of the Royal Society of London
    • Marr, D.: Simple memory: a theory for archicortex. Philosophical Transactions of the Royal Society of London. Series B, Biological Sciences, 23-81 (1971)
    • (1971) Series B, Biological Sciences , pp. 23-81
    • Marr, D.1
  • 42
    • 84892425091 scopus 로고    scopus 로고
    • (retrieved August 16, 2011)
    • Monroe, R.: Xkcd: Password strength, http://www.xkcd.com/936/ (retrieved August 16, 2011)
    • Password Strength
    • Monroe, R.X.1
  • 44
    • 84947756322 scopus 로고    scopus 로고
    • On the incomparability of entropy and marginal guesswork in bruteforce attacks
    • Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. Springer, Heidelberg
    • Pliam, J.O.: On the incomparability of entropy and marginal guesswork in bruteforce attacks. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 67-79. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1977 , pp. 67-79
    • Pliam, J.O.1
  • 47
    • 84892424156 scopus 로고
    • The poisson process as a model for a diversity of behavioral phenomena
    • Rasch, G.: The poisson process as a model for a diversity of behavioral phenomena. In: International Congress of Psychology (1963)
    • (1963) International Congress of Psychology
    • Rasch, G.1
  • 49
    • 70449688213 scopus 로고    scopus 로고
    • It's no secret. Measuring the security and reliability of authentication via 'secret' questions
    • IEEE
    • Schechter, S., Brush, A., Egelman, S.: It's no secret. measuring the security and reliability of authentication via 'secret' questions. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 375-390. IEEE (2009)
    • (2009) 2009 30th IEEE Symposium on Security and Privacy , pp. 375-390
    • Schechter, S.1    Brush, A.2    Egelman, S.3
  • 51
    • 84889020294 scopus 로고    scopus 로고
    • No plaintext passwords
    • November (retrieved August 16, 2011)
    • Singer, A.: No plaintext passwords. The Magazine of Usenix & Sage 26(7) (November 2001) (retrieved August 16, 2011)
    • (2001) The Magazine of Usenix & Sage , vol.26 , Issue.7
    • Singer, A.1
  • 52
    • 84892428234 scopus 로고
    • The memory palace of Matteo Ricci
    • Spence, J.: The memory palace of Matteo Ricci. Penguin Books (1985)
    • (1985) Penguin Books
    • Spence, J.1
  • 55
    • 84892425440 scopus 로고    scopus 로고
    • Pimp my password
    • August 29
    • Stein, J.: Pimp my password. Time, 62 (August 29, 2011)
    • (2011) Time , pp. 62
    • Stein, J.1
  • 56
    • 13844317780 scopus 로고    scopus 로고
    • Memorization and association on a realistic neural model
    • Valiant, L.: Memorization and association on a realistic neural model. Neural Computation 17(3), 527-555 (2005)
    • (2005) Neural Computation , vol.17 , Issue.3 , pp. 527-555
    • Valiant, L.1
  • 58
    • 35248831179 scopus 로고    scopus 로고
    • Captcha: Using hard ai problems for security
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Von Ahn, L., Blum, M., Hopper, N., Langford, J.: Captcha: Using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 646-646. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 646-646
    • Von Ahn, L.1    Blum, M.2    Hopper, N.3    Langford, J.4
  • 59
    • 0025716048 scopus 로고
    • An assessment of marr's theory of the hippocampus as a temporary memory store
    • Philosophical Transactions of the Royal Society of London
    • Willshaw, D., Buckingham, J.: An assessment of marr's theory of the hippocampus as a temporary memory store. Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences 329(1253), 205 (1990)
    • (1990) Series B: Biological Sciences , vol.329 , Issue.1253 , pp. 205
    • Willshaw, D.1    Buckingham, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.