-
1
-
-
85029585226
-
-
Passwords, 2009. http://wiki.skullsecurity.org/Passwords.
-
(2009)
Passwords
-
-
-
6
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
IEEE
-
J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In Proceedings of IEEE Symposium on Security and Privacy, pages 538-552. IEEE, 2012.
-
(2012)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 538-552
-
-
Bonneau, J.1
-
7
-
-
27544477471
-
-
US Department of Commerce, Technology Administration, National Institute of Standards and Technology
-
W. E. Burr, D. F. Dodson, and W. T. Polk. Electronic authentication guideline. US Department of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.
-
(2004)
Electronic Authentication Guideline
-
-
Burr, W.E.1
Dodson, D.F.2
Polk, W.T.3
-
10
-
-
84877958414
-
Does my password go up to eleven?: The impact of password meters on password selection
-
S. Egelman, A. Sotirakopoulos, I. Muslukhov, K. Beznosov, and C. Herley. Does my password go up to eleven?: The impact of password meters on password selection. In Proceedings of CHI, pages 2379-2388, 2013.
-
(2013)
Proceedings of CHI
, pp. 2379-2388
-
-
Egelman, S.1
Sotirakopoulos, A.2
Muslukhov, I.3
Beznosov, K.4
Herley, C.5
-
11
-
-
35348884906
-
A large-scale study of web password habits
-
D. Florencio and C. Herley. A large-scale study of web password habits. In Proceedings of WWW, pages 657-666, 2007.
-
(2007)
Proceedings of WWW
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
12
-
-
65449177711
-
Improving text passwords through persuasion
-
A. Forget, S. Chiasson, P. C. van Oorschot, and R. Biddle. Improving text passwords through persuasion. In Proceedings of SOUPS, pages 1-12, 2008.
-
(2008)
Proceedings of SOUPS
, pp. 1-12
-
-
Forget, A.1
Chiasson, S.2
Van Oorschot, P.C.3
Biddle, R.4
-
13
-
-
84953486351
-
Good-turing frequency estimation without tears
-
W. A. Gale and G. Sampson. Good-turing frequency estimation without tears. Journal of Quantitative Linguistics, 2(1):217-237, 1995.
-
(1995)
Journal of Quantitative Linguistics
, vol.2
, Issue.1
, pp. 217-237
-
-
Gale, W.A.1
Sampson, G.2
-
14
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
C. Herley and P. C. van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 10(1):28-36, 2012.
-
(2012)
IEEE Security & Privacy
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.C.2
-
15
-
-
84872105946
-
Building better passwords using probabilistic techniques
-
S. Houshmand and S. Aggarwal. Building better passwords using probabilistic techniques. In Proceedings of ACSAC, pages 109-118, 2012.
-
(2012)
Proceedings of ACSAC
, pp. 109-118
-
-
Houshmand, S.1
Aggarwal, S.2
-
16
-
-
0023312404
-
Estimation of probabilities from sparse data for the language model component of a speech recogniser
-
S. M. Katz. Estimation of probabilities from sparse data for the language model component of a speech recogniser. IEEE Transactions on Acoustics, Speech, and Signal Processing, 35(3):400401, 1987.
-
(1987)
IEEE Transactions on Acoustics, Speech, and Signal Processing
, vol.35
, Issue.3
, pp. 400401
-
-
Katz, S.M.1
-
17
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, and J. Lopez. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In IEEE Symposium on Security and Privacy, pages 523-537, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 523-537
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
18
-
-
79958161706
-
Of passwords and people: Measuring the effect of password-composition policies
-
S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman. Of passwords and people: measuring the effect of password-composition policies. In CHI, pages 2595-2604, 2011.
-
(2011)
CHI
, pp. 2595-2604
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
19
-
-
84860859593
-
Investigating the distribution of password choices
-
D. Malone and K. Maher. Investigating the distribution of password choices. In Proceedings of WWW, pages 301-310, 2012.
-
(2012)
Proceedings of WWW
, pp. 301-310
-
-
Malone, D.1
Maher, K.2
-
20
-
-
84889053137
-
Measuring password guessability for an entire university
-
Berlin, Germany, ACM
-
M. L. Mazurek, S. Komanduri, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, P. G. Kelley, R. Shay, and B. Ur. Measuring password guessability for an entire university. In Proceedings of ACM CCS, pages 173-186, Berlin, Germany, 2013. ACM.
-
(2013)
Proceedings of ACM CCS
, pp. 173-186
-
-
Mazurek, M.L.1
Komanduri, S.2
Vidas, T.3
Bauer, L.4
Christin, N.5
Cranor, L.F.6
Kelley, P.G.7
Shay, R.8
Ur, B.9
-
21
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
A. Narayanan and V. Shmatikov. Fast dictionary attacks on passwords using time-space tradeoff. In Proceedings of ACM CCS, pages 364-372, 2005.
-
(2005)
Proceedings of ACM CCS
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
22
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
New York, NY, USA, ACM
-
R. Shay, S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor. Encountering stronger password requirements: user attitudes and behaviors. In Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pages 2:1-2:20, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10
, pp. 1-20
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
Leon, P.G.4
Mazurek, M.L.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
-
23
-
-
84979173757
-
How does your password measure up? The effect of strength meters on password creation
-
B. Ur, P. G. Kelley, S. Komanduri, J. Lee, M. Maass, M. Mazurek, T. Passaro, R. Shay, T. Vidas, L. Bauer, et al. How does your password measure up? the effect of strength meters on password creation. In Proceedings of USENIX Security Symposium, 2012.
-
(2012)
Proceedings of USENIX Security Symposium
-
-
Ur, B.1
Kelley, P.G.2
Komanduri, S.3
Lee, J.4
Maass, M.5
Mazurek, M.6
Passaro, T.7
Shay, R.8
Vidas, T.9
Bauer, L.10
-
24
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM conference on Computer and communications security, pages 162-175, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
25
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek. Password cracking using probabilistic context-free grammars. In IEEE Symposium on Security and Privacy, pages 391-405, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
26
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proceedings of ACM CCS, pages 176-186, 2010.
-
(2010)
Proceedings of ACM CCS
, pp. 176-186
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
|