-
1
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
May
-
M. Weir, S. Aggarwal, B. de Medeiros, B. Glodek, "Password cracking using probabilistic context-free grammars," in Proc. 30th IEEE Symp. Secur. Privacy, May 2009, pp. 391-405.
-
(2009)
Proc. 30th IEEE Symp. Secur. Privacy
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
3
-
-
77953306210
-
Password strength: An empirical analysis
-
M. Dell'Amico, P. Michiardi, Y. Roudier, "Password strength: An empirical analysis," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc IEEE INFOCOM, Mar
, pp. 1-9
-
-
Dell'Amico, M.1
Michiardi, P.2
Roudier, Y.3
-
4
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
May
-
P. G. Kelley et al., "Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms," in Proc. IEEE Symp. Secur. Privacy (SP), May 2012, pp. 523-537.
-
(2012)
Proc IEEE Symp. Secur. Privacy (SP)
, pp. 523-537
-
-
Kelley, P.G.1
-
5
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
Y. Zhang, F. Monrose, M. K. Reiter, "The security of modern password expiration: An algorithmic framework and empirical analysis," in Proc. 17th ACM Conf. Comput. Commun. Secur., 2010, pp. 176-186.
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Secur
, pp. 176-186
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
-
6
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
M. Weir, S. Aggarwal, M. Collins, H. Stern, "Testing metrics for password creation policies by attacking large sets of revealed passwords," in Proc. 17th ACM Conf. Comput. Commun. Secur., 2010, pp. 162-175.
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Secur
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
10
-
-
84914107564
-
A study of probabilistic password models
-
May
-
J. Ma, W. Yang, M. Luo, N. Li, "A study of probabilistic password models," in Proc. 35th IEEE Symp. Secur. Privacy, May 2014, pp. 689-704.
-
(2014)
Proc. 35th IEEE Symp. Secur. Privacy
, pp. 689-704
-
-
Ma, J.1
Yang, W.2
Luo, M.3
Li, N.4
-
11
-
-
84872105856
-
-
[Online]. Available accessed Apr 30 2015
-
John the Ripper Password Cracker. [Online]. Available: http://www.openwall.com, accessed Apr. 30, 2015.
-
John the Ripper Password Cracker
-
-
-
12
-
-
84960898947
-
-
Hashcat Advanced Password Recovery [Online]. Available accessed Apr 30 2015
-
Hashcat Advanced Password Recovery. [Online]. Available: http://www.hashcat.net, accessed Apr. 30, 2015.
-
-
-
-
13
-
-
39349101677
-
Password security: What users know and what they actually do
-
S. Riley, "Password security: What users know and what they actually do," Usability News, vol. 8, no. 1, pp. 2833-2836, 2006.
-
(2006)
Usability News
, vol.8
, Issue.1
, pp. 2833-2836
-
-
Riley, S.1
-
14
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross et al., "Your botnet is my botnet: Analysis of a botnet takeover," in Proc. 16th ACM Conf. Comput. Commun. Secur., 2009, pp. 635-647.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Secur
, pp. 635-647
-
-
Stone-Gross, B.1
-
15
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
R. Shay et al., "Encountering stronger password requirements: User attitudes and behaviors," in Proc. 6th Symp. Usable Privacy Secur., 2010, Art. ID 2.
-
(2010)
Proc. 6th Symp. Usable Privacy Secur
-
-
Shay, R.1
-
17
-
-
57349172635
-
PassShape: Stroke based shape passwords
-
A. De Luca, R. Weiss, H. Hussmann, "PassShape: Stroke based shape passwords," in Proc. 19th Austral. Conf. Comput.-Human Interact., Entertaining User Interf., 2007, pp. 239-240.
-
(2007)
Proc. 19th Austral. Conf. Comput.-Human Interact., Entertaining User Interf
, pp. 239-240
-
-
De Luca, A.1
Weiss, R.2
Hussmann, H.3
-
18
-
-
77949403432
-
Visualizing keyboard pattern passwords
-
D. Schweitzer, J. Boleng, C. Hughes, L. Murphy, "Visualizing keyboard pattern passwords," in Proc. 6th Int. Workshop Vis. Cyber Secur. (VizSec), 2009, pp. 69-73.
-
(2009)
Proc. 6th Int. Workshop Vis. Cyber Secur. (VizSec)
, pp. 69-73
-
-
Schweitzer, D.1
Boleng, J.2
Hughes, C.3
Murphy, L.4
-
19
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
May
-
J. Bonneau, "The science of guessing: Analyzing an anonymized corpus of 70 million passwords," in Proc. IEEE Symp. Secur. Privacy (SP), May 2012, pp. 538-552.
-
(2012)
Proc IEEE Symp. Secur. Privacy (SP)
, pp. 538-552
-
-
Bonneau, J.1
-
20
-
-
78650009077
-
If your password is 123456, just make it hackme
-
Jan 20 [Online]. Available
-
A. Vance. (Jan. 20, 2010). If your password is 123456, just make it hackme. The New York Times. [Online]. Available: http://www.nytimes.com/2010/01/21/technology/21password.html
-
(2010)
The New York Times
-
-
Vance, A.1
-
21
-
-
84960865509
-
-
6 Million Users' Privacy Leaked [Online]. Available accessed Apr 30 2015
-
6 Million Users' Privacy Leaked. [Online]. Available: http://www.chinaonline-marketing.com/news/anti-virus-news/csdn-tianya-renren-kaixinhacked-6-million-users-privacy-leaked/, accessed Apr. 30, 2015.
-
-
-
-
22
-
-
12844275960
-
Password memorability and security: Empirical results
-
Sep./Oct.
-
J. Yan, A. Blackwell, R. Anderson, A. Grant, "Password memorability and security: Empirical results," IEEE Security Privacy, vol. 2, no. 5, pp. 25-31, Sep./Oct. 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
23
-
-
34250767745
-
Human selection of mnemonic phrase-based passwords
-
C. Kuo, S. Romanosky, L. F. Cranor, "Human selection of mnemonic phrase-based passwords," in Proc. 2nd Symp. Usable Privacy Secur., 2006, pp. 67-78.
-
(2006)
Proc. 2nd Symp. Usable Privacy Secur
, pp. 67-78
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
26
-
-
0040231044
-
Foiling the cracker': A survey of, improvements to, password security
-
D. V. Klein, "'Foiling the cracker': A survey of, improvements to, password security," in Proc. 2nd USENIX Secur. Workshop, 1990, pp. 5-14.
-
(1990)
Proc. 2nd USENIX Secur. Workshop
, pp. 5-14
-
-
Klein, D.V.1
-
27
-
-
70449694703
-
-
Oct. 27 [Online]. Available
-
R. McMillan. (Oct. 27, 2006). Phishing Attack Targets MySpace Users. [Online]. Available: http://www.infoworld.com/d/security-central/phishing-attack-targets-myspace-users-614
-
(2006)
Phishing Attack Targets MySpace Users
-
-
McMillan, R.1
-
28
-
-
84872099578
-
-
[Online]. Available
-
T. Warren. (2009). Thousands of Hotmail Passwords Leaked. [Online]. Available: http://www.neowin.net/news/main/09/10/05/thousands-of-hotmail-passwords-leaked-online
-
(2009)
Thousands of Hotmail Passwords Leaked
-
-
Warren, T.1
-
29
-
-
84960907919
-
-
[Online]. Available accessed Apr 30 2015
-
Yahoo Credentials. [Online]. Available: http://news.cnet. com/8301-1009-3-57470786-83/hackers-post-450k-credentials-pilferedfrom-yahoo, accessed Apr. 30, 2015.
-
Yahoo Credentials
-
-
-
30
-
-
84960928509
-
-
[Online]. Available accessed Apr 30 2015
-
The English Open Word List. [Online]. Available: http://dreamsteep. com/projects/the-english-open-word-list.html, accessed Apr. 30, 2015.
-
The English Open Word List
-
-
-
32
-
-
85026952319
-
-
Top 40, 000 Words From TV and Movie Scripts. [Online]. Available accessed Apr 30 2015
-
Top 40, 000 Words From TV and Movie Scripts. [Online]. Available: http://en.wiktionary.org/wiki/Wiktionary:Frequencylists#TVandmoviescripts, accessed Apr. 30, 2015.
-
-
-
-
33
-
-
84960848875
-
-
[Online]. Available accessed Apr 30 2015
-
(2005). The Dic0294 Wordlist. [Online]. Available: http://www.outpost9.com/files/WordLists.html, accessed Apr. 30, 2015.
-
(2005)
The Dic0294 Wordlist
-
-
-
34
-
-
84960941597
-
-
[Online]. Available accessed Apr 30 2015
-
KoreLogic Rule Set. [Online]. Available: http://openwall.info/wiki/john/rules, accessed Apr. 30, 2015.
-
KoreLogic Rule Set
-
-
-
35
-
-
84889053137
-
Measuring password guessability for an entire university
-
M. L. Mazurek et al., "Measuring password guessability for an entire university," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2013, pp. 173-186.
-
(2013)
Proc ACM SIGSAC Conf. Comput. Commun. Secur
, pp. 173-186
-
-
Mazurek, M.L.1
-
36
-
-
84925268012
-
Regression models and life-tables
-
New York, NY, USA: Springer-Verlag
-
D. R. Cox, "Regression models and life-tables," in Breakthroughs in Statistics. New York, NY, USA: Springer-Verlag, 1992, pp. 527-541.
-
(1992)
Breakthroughs in Statistics
, pp. 527-541
-
-
Cox, D.R.1
-
37
-
-
0000957062
-
Asymptotically efficient rank invariant test procedures
-
R. Peto and J. Peto, "Asymptotically efficient rank invariant test procedures," J. Roy. Statist. Soc. A (General), vol. 135, no. 2, pp. 185-207, 1972.
-
(1972)
J. Roy. Statist. Soc. A (General)
, vol.135
, Issue.2
, pp. 185-207
-
-
Peto, R.1
Peto, J.2
|