-
1
-
-
0043232732
-
Users are not the enemy
-
Dec
-
ADAMS, A., AND SASSE, M. A. Users are not the enemy. Com-mun. ACM 42, 12 (Dec. 1999), 40–46.
-
(1999)
Com-Mun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
85019748703
-
On the security of RC4 in TLS
-
Berkeley, CA, USA, SEC’13, USENIX Association
-
ALFARDAN, N. J., BERNSTEIN, D. J., PATERSON, K. G., POETTERING, B., AND SCHULDT, J. C. N. On the Security of RC4 in TLS. In Proceedings of the 22nd USENIX Conference on Security (Berkeley, CA, USA, 2013), SEC’13, USENIX Association, pp. 305–320.
-
(2013)
Proceedings of the 22nd USENIX Conference on Security
, pp. 305-320
-
-
Alfardan, N.J.1
Bernstein, D.J.2
Paterson, K.G.3
Poettering, B.4
Schuldt, J.C.N.5
-
4
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
21-23 May 2012, San Francisco, California, USA IEEE Computer Society
-
BONNEAU, J. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA (2012), IEEE Computer Society, pp. 538–552.
-
(2012)
IEEE Symposium on Security and Privacy, SP 2012
, pp. 538-552
-
-
Bonneau, J.1
-
5
-
-
79958097346
-
The password thicket: Technical and market failures in human authentication on the web
-
Harvard University, Cambridge, MA, USA, June 7 8
-
BONNEAU, J., AND PREIBUSCH, S. The password thicket: Technical and market failures in human authentication on the web. In 9th Annual Workshop on the Economics of Information Security, WEIS 2010, Harvard University, Cambridge, MA, USA, June 7 - 8 (2010).
-
(2010)
9th Annual Workshop on the Economics of Information Security, WEIS 2010
-
-
Bonneau, J.1
Preibusch, S.2
-
9
-
-
35348884906
-
A Large-scale Study of Web Password Habits
-
New York, NY, USA, WWW’07, ACM
-
FLORENCIO, D., AND HERLEY, C. A Large-scale Study of Web Password Habits. In Proceedings of the 16th International Conference on World Wide Web (New York, NY, USA, 2007), WWW’07, ACM, pp. 657–666.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
10
-
-
84974666258
-
Statistical analysis of the alleged RC4 keystream generator
-
B. Schneier, Ed., 1978 of Lecture Notes in Computer Science, Springer
-
FLUHRER, S. R., AND MCGREW, D. Statistical analysis of the alleged RC4 keystream generator. In FSE (2000), B. Schneier, Ed., vol. 1978 of Lecture Notes in Computer Science, Springer, pp. 19–30.
-
(2000)
FSE
, pp. 19-30
-
-
Fluhrer, S.R.1
McGrew, D.2
-
11
-
-
0003365506
-
HTTP authentication: Basic and Digest Access authentication
-
June
-
FRANKS, J., HALLAM-BAKER, P., HOSTETLER, J., LAWRENCE, S., LEACH, P., LUOTONEN, A., AND STEWART, L. HTTP Authentication: Basic and Digest Access authentication. RFC 2617 (Informational), June 1999.
-
(1999)
RFC 2617 (Informational)
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
13
-
-
84891778578
-
Full plaintext recovery attack on broadcast RC4
-
ISOBE, T., OHIGASHI, T., WATANABE, Y., AND MORII, M. Full plaintext recovery attack on broadcast RC4. In Preproceedings of FSE (2013).
-
(2013)
Preproceedings of FSE
-
-
Isobe, T.1
Ohigashi, T.2
Watanabe, Y.3
Morii, M.4
-
14
-
-
24944554565
-
Predicting and distinguishing attacks on RC4 keystream generator
-
R. Cramer, Ed.,. of Lecture Notes in Computer Science, Springer
-
MANTIN, I. Predicting and distinguishing attacks on RC4 keystream generator. In EUROCRYPT (2005), R. Cramer, Ed., vol. 3494 of Lecture Notes in Computer Science, Springer, pp. 491–506.
-
(2005)
EUROCRYPT
, vol.3494
, pp. 491-506
-
-
Mantin, I.1
-
15
-
-
84958972140
-
A practical attack on broadcast RC4
-
M. Matsui, Ed.,. of Lecture Notes in Computer Science, Springer
-
MANTIN, I., AND SHAMIR, A. A practical attack on broadcast RC4. In FSE (2001), M. Matsui, Ed., vol. 2355 of Lecture Notes in Computer Science, Springer, pp. 152–164.
-
(2001)
FSE
, vol.2355
, pp. 152-164
-
-
Mantin, I.1
Shamir, A.2
-
16
-
-
84902580282
-
How to recover any byte of plaintext on RC4
-
Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (2013), T. Lange, K. E. Lauter, and Lisonek, Eds.,. of Lecture Notes in Computer Science, Springer
-
OHIGASHI, T., ISOBE, T., WATANABE, Y., AND MORII, M. How to recover any byte of plaintext on RC4. In Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (2013), T. Lange, K. E. Lauter, and P. Lisonek, Eds., vol. 8282 of Lecture Notes in Computer Science, Springer, pp. 155–173.
-
Selected Areas in Cryptography - SAC 2013 - 20th International Conference
, vol.8282
, pp. 155-173
-
-
Ohigashi, T.1
Isobe, T.2
Watanabe, Y.3
Morii, M.4
-
17
-
-
57849156679
-
Transport layer security (TLS) session resumption without server-side state
-
Jan
-
SALOWEY, J., ZHOU, H., ERONEN, P., AND TSCHOFENIG, H. Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 5077 (Proposed Standard), Jan. 2008.
-
(2008)
RFC 5077 (Proposed Standard)
-
-
Salowey, J.1
Zhou, H.2
Eronen, P.3
Tschofenig, H.4
-
18
-
-
84916616990
-
Proving TLS-attack related open biases of RC4
-
SARKAR, S., SEN GUPTA, S., PAUL, G., AND MAITRA, S. Proving TLS-attack related open biases of RC4. IACR Cryptology ePrint Archive 2013 (2013), 502.
-
(2013)
IACR Cryptology ePrint Archive
, vol.2013
, pp. 502
-
-
Sarkar, S.1
Sen Gupta, S.2
Paul, G.3
Maitra, S.4
-
19
-
-
84894899538
-
Non-) random sequences from (non-) random permutations – Analysis of RC4 stream cipher
-
SEN GUPTA, S., MAITRA, S., PAUL, G., AND SARKAR, S. (Non-) random sequences from (non-) random permutations – analysis of RC4 stream cipher. Journal of Cryptology 27, 1 (2012), 67–108.
-
(2012)
Journal of Cryptology
, vol.27
, Issue.1
, pp. 67-108
-
-
Sen Gupta, S.1
Maitra, S.2
Paul, G.3
Sarkar, S.4
-
20
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
Chicago, Illinois, USA, October 4-8, 2010 (2010), E. Al-Shaer, A. D. Keromytis, and Shmatikov, Eds., ACM
-
WEIR, M., AGGARWAL, S., COLLINS, M. P., AND STERN, H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 (2010), E. Al-Shaer, A. D. Keromytis, and V. Shmatikov, Eds., ACM, pp. 162–175.
-
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.P.3
Stern, H.4
-
21
-
-
12844275960
-
Password memorability and security: Empirical results
-
Sept
-
YAN, J., BLACKWELL, A., ANDERSON, R., AND GRANT, A. Password Memorability and Security: Empirical Results. IEEE Security and Privacy 2, 5 (Sept. 2004), 25–31.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
22
-
-
0033277446
-
Password security: An empirical study
-
Mar
-
ZVIRAN, M., AND HAGA, W. J. Password Security: An Empirical Study. J. Manage. Inf. Syst. 15, 4 (Mar. 1999), 161–185.
-
(1999)
J. Manage. Inf. Syst.
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.J.2
|