메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Popularity is everything a new approach to protecting passwords from statistical-guessing attacks

Author keywords

[No Author keywords available]

Indexed keywords

DATA STRUCTURES;

EID: 85071080463     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (96)

References (23)
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users Are Not the Enemy
    • Adams, A., and Sasse, M. A. Users Are Not the Enemy. Commun. ACM 42, 12 (1999).
    • (1999) Commun. ACM , vol.42 , pp. 12
    • Adams, A.1    Sasse, M. A.2
  • 3
    • 70350546040 scopus 로고    scopus 로고
    • Privacy-preserving indexing of documents on the network
    • Bawa, M., Bayardo, R., Agrawal, R., and Vaidya, J. Privacy-preserving indexing of documents on the network. The VLDB Journal 18, 4 (2009), 837-856.
    • (2009) The VLDB Journal , vol.18 , Issue.4 , pp. 837-856
    • Bawa, M.1    Bayardo, R.2    Agrawal, R.3    Vaidya, J.4
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B.H. Bloom. Space/time trade-offs in hash coding with allowable errors. Comm. of the ACM (1970).
    • (1970) Comm. of the ACM
    • Bloom, B.H.1
  • 5
    • 2442583610 scopus 로고    scopus 로고
    • New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice
    • C. Estan and G. Varghese. New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice. ACM Transactions on Computer Systems (2003).
    • (2003) ACM Transactions on Computer Systems
    • Estan, C.1    Varghese, G.2
  • 6
    • 0040231044 scopus 로고
    • Foiling the Cracker: A Survey of, and Improvements to, Password Security
    • D. V. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proc. of the 2nd USENIX Security Workshop (1990).
    • (1990) Proc. of the 2nd USENIX Security Workshop
    • Klein, D. V.1
  • 7
    • 70849087587 scopus 로고    scopus 로고
    • The Way I See It: When security gets in the way
    • D.A. Norman. The Way I See It: When security gets in the way. Interactions 16, 6 (2009), 60-63.
    • (2009) Interactions , vol.16 , Issue.6 , pp. 60-63
    • Norman, D.A.1
  • 9
    • 0026869371 scopus 로고
    • OPUS: Preventing weak password choices
    • EH Spafford. OPUS: Preventing weak password choices. Computers & Security (1992).
    • (1992) Computers & Security
    • Spafford, EH1
  • 12
    • 0030712013 scopus 로고    scopus 로고
    • Proactive Password Checking with Decision Trees
    • G. Bergadano, B. Crispo and G. Ruffo. Proactive Password Checking with Decision Trees. Proc. CCS (1997).
    • (1997) Proc. CCS
    • Bergadano, G.1    Crispo, B.2    Ruffo, G.3
  • 13
    • 14844367057 scopus 로고    scopus 로고
    • An Improved Data Stream Summary: The Count-Min Sketch and Its Applications
    • G. Cormode and S. Muthukrishnan. An Improved Data Stream Summary: The Count-Min Sketch and Its Applications. Journal of Algorithms (2005).
    • (2005) Journal of Algorithms
    • Cormode, G.1    Muthukrishnan, S.2
  • 14
    • 84883231040 scopus 로고    scopus 로고
    • Imperva
    • Imperva. Consumer Password Worst Practices. http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf.
    • Consumer Password Worst Practices
  • 18
    • 33750906057 scopus 로고    scopus 로고
    • On Countering Online Dictionary Attacks with Login Histories and Humans-in-the-Loop
    • P.C. van Oorschot, S. Stubblebine. On Countering Online Dictionary Attacks with Login Histories and Humans-in-the-Loop. ACM TISSEC vol.9 issue 3 (2006).
    • (2006) ACM TISSEC , vol.9 , Issue.3
    • van Oorschot, P.C.1    Stubblebine, S.2
  • 19
    • 0038687701 scopus 로고    scopus 로고
    • Securing Passwords Against Dictionary Attacks
    • Pinkas, B., and Sander, T. Securing Passwords Against Dictionary Attacks. ACM CCS (2002).
    • (2002) ACM CCS
    • Pinkas, B.1    Sander, T.2
  • 21
    • 70449688213 scopus 로고    scopus 로고
    • It's No Secret: Measuring the Security and Reliability of Authentication via”Secret” Questions
    • Schechter, S. E., Brush, A. J. B., and Egelman, S. It's No Secret: Measuring the Security and Reliability of Authentication via”Secret” Questions. In IEEE Symposium on Security and Privacy (2009), pp. 375-390.
    • (2009) IEEE Symposium on Security and Privacy , pp. 375-390
    • Schechter, S. E.1    Brush, A. J. B.2    Egelman, S.3
  • 22
    • 56849108466 scopus 로고    scopus 로고
    • MySpace Passwords Aren't So Dumb
    • Dec
    • Schneier, B. MySpace Passwords Aren't So Dumb. Wired, Dec. (2006). http://www.wired.com/politics/security/commentary/securitymatters/2006/12/72300.
    • (2006) Wired
    • Schneier, B.1
  • 23
    • 0028428699 scopus 로고
    • An Algorithm for Approximate Membership Checking with Application to Password Security
    • U. Manber, S. Wu. An Algorithm for Approximate Membership Checking with Application to Password Security. Information Processing Letters (1994).
    • (1994) Information Processing Letters
    • Manber, U.1    Wu, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.