-
3
-
-
85076301618
-
-
Wordlist from outpost9. http://www.outpost9.com/files/WordLists.html.
-
-
-
-
4
-
-
85076274466
-
-
178.COM. http://www.178.com/s/information/about.html.
-
-
-
-
5
-
-
85076284483
-
-
7K7K. http://www.7k7k.com/html/about.htm.
-
-
-
-
7
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
-
BONNEAU, J., HERLEY, C., VAN OORSCHOT, P. C., AND STAJANO, F. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proceedings of 2012 IEEE Symposium on Security and Privacy (SP) (2012), IEEE, pp. 553-567.
-
(2012)
Proceedings of 2012 IEEE Symposium on Security and Privacy (SP)
, pp. 553-567
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Stajano, F.4
-
9
-
-
84879755136
-
Of contraseñas, sysmawt, and mímǎ: Character encoding issues for web passwords
-
May
-
BONNEAU, J., and XU, R. "of contraseñas, sysmawt, and mímǎ: Character encoding issues for web passwords". In Web 2.0 Security & Privacy (May 2012).
-
(2012)
Web 2.0 Security & Privacy
-
-
Bonneau, J.1
Xu, R.2
-
10
-
-
77955315457
-
-
Tech. rep., Department of Mathematics, Royal Melbourne Institute of Technology
-
BOZTAS, S. Entropies, guessing, and cryptography. Tech. rep., Department of Mathematics, Royal Melbourne Institute of Technology, 1999.
-
(1999)
Entropies, Guessing, and Cryptography
-
-
Boztas, S.1
-
11
-
-
45849116070
-
-
BURR, W. E., and DODSON., D. F., NEWTON, E. M., PERLNER, R. A., and POLK., W. T., GUPTA, S., and NABBUS, E. A. Nist special publication 800-63-1 electronic authentication guideline, 2006.
-
(2006)
Nist Special Publication 800-63-1 Electronic Authentication Guideline
-
-
Burr, W.E.1
Dodson, D.F.2
Newton, E.M.3
Perlner, R.A.4
Polk, W.T.5
Gupta, S.6
Nabbus, E.A.7
-
13
-
-
85076291310
-
-
CSDN. http://www.csdn.net/company/about.html.
-
-
-
-
14
-
-
85133463240
-
The tangled web of password reuse
-
DAS, A., BONNEAU, J., CAESAR, M., BORISOV, N., and WANG, X. The tangled web of password reuse. In Proceedings of NDSS 2014 (2014).
-
(2014)
Proceedings of NDSS
, vol.2014
-
-
Das, A.1
Bonneau, J.2
Caesar, M.3
Borisov, N.4
Wang, X.5
-
15
-
-
85104527602
-
From very weak to very strong: Analyzing password-strength meters
-
DE CARN DE CARNAVALET, X., AND MANNAN, M. From very weak to very strong: Analyzing password-strength meters. In Proceedings of NDSS 2014 (2014).
-
(2014)
Proceedings of NDSS
, vol.2014
-
-
De Carn De Carnavalet, X.1
Mannan, M.2
-
16
-
-
77953306210
-
Password strength: An empirical analysis
-
DELL'AMICO, M., MICHIARDI, P., and ROUDIER, Y. Password strength: An empirical analysis. In Proceedings IEEE IN-FOCOM 2010 (2010), IEEE, pp. 1-9.
-
(2010)
Proceedings IEEE IN-FOCOM
, vol.2010
, pp. 1-9
-
-
Dell'Amico, M.1
Michiardi, P.2
Roudier, Y.3
-
17
-
-
85076273343
-
-
DUDUNIU. http://baike.baidu.com/view/1557125.htm.
-
-
-
-
19
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
HERLEY, C., and VAN OORSCHOT, P. A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy 10, 1 (2012), 28-36.
-
(2012)
IEEE Security & Privacy
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.2
-
20
-
-
84875630524
-
The psychology of security for the home computer user
-
HOWE, A., RAY, I., ROBERTS, M., URBANSKA, M., and BYRNE, Z. The psychology of security for the home computer user. In Proceedings of 2012 IEEE Symposium on Security and Privacy (SP) (2012), pp. 209-223.
-
(2012)
Proceedings of 2012 IEEE Symposium on Security and Privacy (SP)
, pp. 209-223
-
-
Howe, A.1
Ray, I.2
Roberts, M.3
Urbanska, M.4
Byrne, Z.5
-
21
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
KELLEY, P., KOMANDURI, S., MAZUREK, M., SHAY, R., VIDAS, T., BAUER, L., CHRISTIN, N., CRANOR, L., and LOPEZ, J. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proceedings of 2012 IEEE Symposium on Security and Privacy (SP) (2012), pp. 523-537.
-
(2012)
Proceedings of 2012 IEEE Symposium on Security and Privacy (SP)
, pp. 523-537
-
-
Kelley, P.1
Komanduri, S.2
Mazurek, M.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.8
Lopez, J.9
-
22
-
-
34250767745
-
Human selection of mnemonic phrase-based passwords
-
KUO, C., ROMANOSKY, S., and CRANOR, L. F. Human selection of mnemonic phrase-based passwords. In Proceedings of the Second Symposium on Usable privacy and security (2006), ACM, pp. 67-78.
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 67-78
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
24
-
-
84889053137
-
Measuring password Guessability for an entire University
-
MAZUREK, M. L., KOMANDURI, S., VIDAS, T., BAUER, L., CHRISTIN, N., CRANOR, L. F., and KELLEY., P. G., SHAY, R., and UR, B. Measuring password guessability for an entire university. In Proceedings of the 2013 ACM Conference on Computer and Communications Security (2013), ACM, pp. 173-186.
-
(2013)
Proceedings of the 2013 ACM Conference on Computer and Communications Security
, pp. 173-186
-
-
Mazurek, M.L.1
Komanduri, S.2
Vidas, T.3
Bauer, L.4
Christin, N.5
Cranor, L.F.6
Kelley, P.G.7
Shay, R.8
Ur, B.9
-
25
-
-
0018543411
-
Password security: A case history
-
MORRIS, R., and THOMPSON, K. Password security: A case history. Communications of the ACM 22, 11 (1979), 594-597.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
28
-
-
84947756322
-
On the incomparability of entropy and marginal guesswork in brute-force attacks
-
PLIAM, J. O. On the incomparability of entropy and marginal guesswork in brute-force attacks. In INDOCRYPT (2000), pp. 67-79.
-
(2000)
INDOCRYPT
, pp. 67-79
-
-
Pliam, J.O.1
-
29
-
-
85121907225
-
On the semantic patterns of passwords and their security impact
-
R. VERAS, C. COLLINS, J. T. On the semantic patterns of passwords and their security impact. In Proceedings of NDSS 2014 (2014).
-
(2014)
Proceedings of NDSS
, vol.2014
-
-
Veras, R.1
Collins, C.2
-
30
-
-
85076297968
-
-
ROCKYOU. http://rockyou.com/ry/about-us.
-
-
-
-
32
-
-
77949403432
-
Visualizing keyboard pattern passwords
-
SCHWEITZER, D., BOLENG, J., HUGHES, C., and MURPHY, L. Visualizing keyboard pattern passwords. In Proceedings of 6th International Workshop on Visualization for Cyber Security (VizSec 2009) (2009), IEEE, pp. 69-73.
-
(2009)
Proceedings of 6th International Workshop on Visualization for Cyber Security (VizSec 2009)
, pp. 69-73
-
-
Schweitzer, D.1
Boleng, J.2
Hughes, C.3
Murphy, L.4
-
33
-
-
85076272535
-
-
TIANYA. http://help.tianya.cn/about/history/2011/06/02/166666.shtml.
-
-
-
-
35
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
WEIR, M., AGGARWAL, S., DE MEDEIROS, B., and GLODEK, B. Password cracking using probabilistic context-free grammars. In Proceedings of the 30th IEEE Symposium on Security and Privacy (2009), IEEE, pp. 391-405.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
37
-
-
85076294220
-
-
YAHOO. http://info.yahoo.com/.
-
-
-
-
38
-
-
12844275960
-
Password memorability and security: Empirical results
-
YAN, J., BLACKWELL, A., ANDERSON, R., and GRANT, A. Password memorability and security: empirical results. IEEE Security Privacy 2, 5 (2004), 25-31.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|