메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Adaptive Password-Strength Meters from Markov Models

Author keywords

[No Author keywords available]

Indexed keywords

MARKOV PROCESSES;

EID: 84959406256     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (148)

References (33)
  • 1
    • 77951542234 scopus 로고    scopus 로고
    • Sharp bounds on the entropy of the poisson law and related quantities
    • J. Adell, A. Lekuona, and Y. Yu. Sharp bounds on the entropy of the poisson law and related quantities. Information Theory, IEEE Transactions on, 56(5):2299-2306, 2010.
    • (2010) Information Theory, IEEE Transactions on , vol.56 , Issue.5 , pp. 2299-2306
    • Adell, J.1    Lekuona, A.2    Yu, Y.3
  • 2
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D. V.2
  • 3
    • 0000460102 scopus 로고    scopus 로고
    • Interval estimation for a binomial proportion
    • L. D. Brown, T. T. Cai, and A. DasGupta. Interval estimation for a binomial proportion. Statistical Science, 16(2):101-133, 2001.
    • (2001) Statistical Science , vol.16 , Issue.2 , pp. 101-133
    • Brown, L. D.1    Cai, T. T.2    DasGupta, A.3
  • 5
    • 85001728633 scopus 로고    scopus 로고
    • Password security: An empirical investigation into e-commerce passwords and their crack times
    • J. A. Cazier and D. B. Medlin. Password security: An empirical investigation into e-commerce passwords and their crack times. Information Security Journal: A Global Perspective, 15(6):45-55, 2006.
    • (2006) Information Security Journal: A Global Perspective , vol.15 , Issue.6 , pp. 45-55
    • Cazier, J. A.1    Medlin, D. B.2
  • 9
    • 77950877250 scopus 로고    scopus 로고
    • So long and no thanks for the externalities: The rational rejection of security advice by users
    • ACM
    • C. Herley. So long and no thanks for the externalities: The rational rejection of security advice by users. In Proceedings of the 2009 Workshop on New security paradigms, pages 133-144. ACM, 2009.
    • (2009) Proceedings of the 2009 Workshop on New security paradigms , pp. 133-144
    • Herley, C.1
  • 11
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • D. V. Klein. Foiling the cracker: A survey of, and improvements to, password security. In Proc. USENIX UNIX Security Workshop, 1990.
    • (1990) Proc. USENIX UNIX Security Workshop
    • Klein, D. V.1
  • 15
    • 38849143105 scopus 로고    scopus 로고
    • Advances in password cracking
    • S. Marechal. Advances in password cracking. Journal in Computer Virology, 4(1):73-81, 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.1 , pp. 73-81
    • Marechal, S.1
  • 17
    • 84901646658 scopus 로고    scopus 로고
    • Online at
    • Microsoft password strength meter. Online at https://www.microsoft.com/security/pc-security/password-checker.aspx.
    • Microsoft password strength meter
  • 18
    • 0018543411 scopus 로고
    • Password security: a case history
    • R. Morris and K. Thompson. Password security: a case history. Communications. ACM, 22(11):594-597, 1979.
    • (1979) Communications. ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 20
    • 84893131709 scopus 로고    scopus 로고
    • Online at
    • The password meter. Online at http://www. passwordmeter.com/.
    • The password meter
  • 21
    • 0038687701 scopus 로고    scopus 로고
    • Securing passwords against dictionary attacks
    • B. Pinkas and T. Sander. Securing passwords against dictionary attacks. In Proc. CCS '02, pages 161-170, 2002.
    • (2002) Proc. CCS '02 , pp. 161-170
    • Pinkas, B.1    Sander, T.2
  • 22
    • 39349101677 scopus 로고    scopus 로고
    • Password security: What users know and what they actually do
    • S. Riley. Password security: What users know and what they actually do. Usability News, 8(1), 2006.
    • (2006) Usability News , vol.8 , Issue.1
    • Riley, S.1
  • 25
    • 84875526358 scopus 로고    scopus 로고
    • Online at
    • SpiderMonkey. Online at http://search.cpan.org/~mschilli/JavaScript-SpiderMonkey.
    • SpiderMonkey
  • 27
    • 78650009077 scopus 로고    scopus 로고
    • If your password is 123456, just make it hackme
    • oneline at retrieved May 2011, January 2010
    • A. Vance. If your password is 123456, just make it hackme. New York Times, oneline at http://www.nytimes.com/2010/01/21/technology/21password.html, retrieved May 2011, January 2010.
    • New York Times
    • Vance, A.1
  • 31
    • 0242708748 scopus 로고    scopus 로고
    • A note on proactive password checking
    • ACM
    • J. J. Yan. A note on proactive password checking. In Proc. NSPW '01, pages 127-135. ACM, 2001.
    • (2001) Proc. NSPW '01 , pp. 127-135
    • Yan, J. J.1
  • 33
    • 68249133772 scopus 로고    scopus 로고
    • On the entropy of compound distributions on nonnegative integers
    • Y. Yu. On the entropy of compound distributions on nonnegative integers. IEEE Trans. Inf. Theor., 55:3645-3650, 2009.
    • (2009) IEEE Trans. Inf. Theor , vol.55 , pp. 3645-3650
    • Yu, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.