-
1
-
-
77951542234
-
Sharp bounds on the entropy of the poisson law and related quantities
-
J. Adell, A. Lekuona, and Y. Yu. Sharp bounds on the entropy of the poisson law and related quantities. Information Theory, IEEE Transactions on, 56(5):2299-2306, 2010.
-
(2010)
Information Theory, IEEE Transactions on
, vol.56
, Issue.5
, pp. 2299-2306
-
-
Adell, J.1
Lekuona, A.2
Yu, Y.3
-
2
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D. V.2
-
3
-
-
0000460102
-
Interval estimation for a binomial proportion
-
L. D. Brown, T. T. Cai, and A. DasGupta. Interval estimation for a binomial proportion. Statistical Science, 16(2):101-133, 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.2
, pp. 101-133
-
-
Brown, L. D.1
Cai, T. T.2
DasGupta, A.3
-
5
-
-
85001728633
-
Password security: An empirical investigation into e-commerce passwords and their crack times
-
J. A. Cazier and D. B. Medlin. Password security: An empirical investigation into e-commerce passwords and their crack times. Information Security Journal: A Global Perspective, 15(6):45-55, 2006.
-
(2006)
Information Security Journal: A Global Perspective
, vol.15
, Issue.6
, pp. 45-55
-
-
Cazier, J. A.1
Medlin, D. B.2
-
8
-
-
85044211678
-
Do strong web passwords accomplish anything?
-
Berkeley, CA, USA, USENIX Association
-
D. Florêncio, C. Herley, and B. Coskun. Do strong web passwords accomplish anything? In Proceedings of the 2nd USENIX workshop on Hot topics in security, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
Proceedings of the 2nd USENIX workshop on Hot topics in security
-
-
Florêncio, D.1
Herley, C.2
Coskun, B.3
-
9
-
-
77950877250
-
So long and no thanks for the externalities: The rational rejection of security advice by users
-
ACM
-
C. Herley. So long and no thanks for the externalities: The rational rejection of security advice by users. In Proceedings of the 2009 Workshop on New security paradigms, pages 133-144. ACM, 2009.
-
(2009)
Proceedings of the 2009 Workshop on New security paradigms
, pp. 133-144
-
-
Herley, C.1
-
11
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
D. V. Klein. Foiling the cracker: A survey of, and improvements to, password security. In Proc. USENIX UNIX Security Workshop, 1990.
-
(1990)
Proc. USENIX UNIX Security Workshop
-
-
Klein, D. V.1
-
12
-
-
79958161706
-
Of passwords and people: Measuring the effect of passwordcomposition policies
-
S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman. Of passwords and people: Measuring the effect of passwordcomposition policies. In CHI 2011: Conference on Human Factors in Computing Systems, 2011.
-
(2011)
CHI 2011: Conference on Human Factors in Computing Systems
-
-
Komanduri, S.1
Shay, R.2
Kelley, P. G.3
Mazurek, M. L.4
Bauer, L.5
Christin, N.6
Cranor, L. F.7
Egelman, S.8
-
15
-
-
38849143105
-
Advances in password cracking
-
S. Marechal. Advances in password cracking. Journal in Computer Virology, 4(1):73-81, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.1
, pp. 73-81
-
-
Marechal, S.1
-
17
-
-
84901646658
-
-
Online at
-
Microsoft password strength meter. Online at https://www.microsoft.com/security/pc-security/password-checker.aspx.
-
Microsoft password strength meter
-
-
-
18
-
-
0018543411
-
Password security: a case history
-
R. Morris and K. Thompson. Password security: a case history. Communications. ACM, 22(11):594-597, 1979.
-
(1979)
Communications. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
19
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
New York, NY, USA, ACM
-
A. Narayanan and V. Shmatikov. Fast dictionary attacks on passwords using time-space tradeoff. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 364-372, New York, NY, USA, 2005. ACM.
-
(2005)
CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
20
-
-
84893131709
-
-
Online at
-
The password meter. Online at http://www. passwordmeter.com/.
-
The password meter
-
-
-
21
-
-
0038687701
-
Securing passwords against dictionary attacks
-
B. Pinkas and T. Sander. Securing passwords against dictionary attacks. In Proc. CCS '02, pages 161-170, 2002.
-
(2002)
Proc. CCS '02
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
22
-
-
39349101677
-
Password security: What users know and what they actually do
-
S. Riley. Password security: What users know and what they actually do. Usability News, 8(1), 2006.
-
(2006)
Usability News
, vol.8
, Issue.1
-
-
Riley, S.1
-
25
-
-
84875526358
-
-
Online at
-
SpiderMonkey. Online at http://search.cpan.org/~mschilli/JavaScript-SpiderMonkey.
-
SpiderMonkey
-
-
-
26
-
-
17844366573
-
Analysis of end user security behaviors
-
J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton. Analysis of end user security behaviors. Comp. & Security, 24(2):124-133, 2005.
-
(2005)
Comp. & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J. M.1
Stam, K. R.2
Mastrangelo, P.3
Jolton, J.4
-
27
-
-
78650009077
-
If your password is 123456, just make it hackme
-
oneline at retrieved May 2011, January 2010
-
A. Vance. If your password is 123456, just make it hackme. New York Times, oneline at http://www.nytimes.com/2010/01/21/technology/21password.html, retrieved May 2011, January 2010.
-
New York Times
-
-
Vance, A.1
-
28
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
ACM
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM conference on Computer and communications security (CCS 2010), pages 162-175. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM conference on Computer and communications security (CCS 2010)
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
29
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
IEEE Computer Society
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek. Password cracking using probabilistic context-free grammars. In IEEE Symposium on Security and Privacy, pages 391-405. IEEE Computer Society, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
de Medeiros, B.3
Glodek, B.4
-
30
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results. IEEE Security and Privacy Magazine, 2(5):25-31, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
31
-
-
0242708748
-
A note on proactive password checking
-
ACM
-
J. J. Yan. A note on proactive password checking. In Proc. NSPW '01, pages 127-135. ACM, 2001.
-
(2001)
Proc. NSPW '01
, pp. 127-135
-
-
Yan, J. J.1
-
33
-
-
68249133772
-
On the entropy of compound distributions on nonnegative integers
-
Y. Yu. On the entropy of compound distributions on nonnegative integers. IEEE Trans. Inf. Theor., 55:3645-3650, 2009.
-
(2009)
IEEE Trans. Inf. Theor
, vol.55
, pp. 3645-3650
-
-
Yu, Y.1
|