-
1
-
-
85180637113
-
-
55K Twitter Passwords Leaked. http://www.newser.com/story/145750/55k-twitter-passwords-leaked.html.
-
55K Twitter Passwords Leaked
-
-
-
2
-
-
85180629481
-
-
6.46 million LinkedIn passwords leaked online
-
6.46 million LinkedIn passwords leaked online. http://www.zdnet.com/blog/btl/6-46-million-linkedin-passwords-leaked-online/79290.
-
-
-
-
3
-
-
85180626950
-
-
Alexa. http://www.alexa.com.
-
-
-
-
7
-
-
85180631733
-
-
MD5 Decryptor. http://www.md5decrypter.co.uk/.
-
MD5 Decryptor
-
-
-
9
-
-
85180627466
-
-
Moby Words II. http://icon.shef.ac.uk/Moby/.
-
Moby Words II
-
-
-
12
-
-
85180637106
-
-
posted online
-
Over 55,000 Twitter passwords exposed, posted online. http://news.yahoo.com/blogs/technology-blog/over-55-000-twitterpasswords-exposed-posted-online-165625320.html.
-
Over 55,000 Twitter passwords exposed
-
-
-
13
-
-
85091598460
-
-
RockYou leak. http://techcrunch.com/2009/12/14/rockyou-hacksecurity-myspace-facebook-passwords/.
-
RockYou leak
-
-
-
15
-
-
84871081203
-
-
Survey Questions. http://web.engr.illinois.edu/~das17/passwordreuse. html.
-
Survey Questions
-
-
-
19
-
-
85180634369
-
-
Yahoo’s password leak. http://news.cnet.com/8301-1009_3-5747117883/yahoos-password-leak-what-you-need-to-know-faq/.
-
-
-
-
20
-
-
0043232732
-
Users Are Not The Enemy
-
A. Adams and M. A. Sasse, “Users Are Not The Enemy,” Commun. ACM, vol. 42, no. 12, pp. 40–46, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M. A.2
-
22
-
-
84878353718
-
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
-
J. Bonneau, C. Herley, P. C. v. Oorschot, and F. Stajano, “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes,” in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP’12, 2012, pp. 553–567.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP’12
, pp. 553-567
-
-
Bonneau, J.1
Herley, C.2
Oorschot, P. C. v.3
Stajano, F.4
-
23
-
-
77955315492
-
What’s in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions
-
J. Bonneau, M. Just, and G. Matthews, “What’s in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions,” in Proceedings of the 14th International conference on Financial Cryptography and Data Security, ser. FC’10, 2010, pp. 98–113.
-
(2010)
Proceedings of the 14th International conference on Financial Cryptography and Data Security, ser. FC’10
, pp. 98-113
-
-
Bonneau, J.1
Just, M.2
Matthews, G.3
-
24
-
-
79958097346
-
The password thicket: technical and market failures in human authentication on the web
-
June [Online]. Available
-
J. Bonneau and S. Preibusch, “The password thicket: technical and market failures in human authentication on the web,” in Proceedings of the 9th Workshop on the Economics of Information Security, June 2010. [Online]. Available: http://www.jbonneau.com/doc/BP10-WEISpassword_thicket.pdf
-
(2010)
Proceedings of the 9th Workshop on the Economics of Information Security
-
-
Bonneau, J.1
Preibusch, S.2
-
26
-
-
80052801173
-
A Usability Study and Critique of Two Password Managers
-
S. Chiasson, P. C. van Oorschot, and R. Biddle, “A Usability Study and Critique of Two Password Managers,” in Proceedings of the 15th conference on USENIX Security Symposium, ser. USENIX-SS’06, 2006.
-
(2006)
Proceedings of the 15th conference on USENIX Security Symposium, ser. USENIX-SS’06
-
-
Chiasson, S.1
van Oorschot, P. C.2
Biddle, R.3
-
27
-
-
11144240583
-
A Comparison of String Distance Metrics for Name-Matching Tasks
-
W. W. Cohen, P. Ravikumar, and S. E. Fienberg, “A Comparison of String Distance Metrics for Name-Matching Tasks,” in Proceedings of IJCAI-03 Workshop on Information Integration, 2003, pp. 73–78.
-
(2003)
Proceedings of IJCAI-03 Workshop on Information Integration
, pp. 73-78
-
-
Cohen, W. W.1
Ravikumar, P.2
Fienberg, S. E.3
-
28
-
-
84941869105
-
A Technique for Computer Detection and Correction of Spelling Errors
-
Mar
-
F. J. Damerau, “A Technique for Computer Detection and Correction of Spelling Errors,” Commun. ACM, vol. 7, no. 3, pp. 171–176, Mar. 1964.
-
(1964)
Commun. ACM
, vol.7
, Issue.3
, pp. 171-176
-
-
Damerau, F. J.1
-
29
-
-
77953306210
-
Password Strength: An Empirical Analysis
-
M. Dell’Amico, P. Michiardi, and Y. Roudier, “Password Strength: An Empirical Analysis,” in Proceedings of the 29th conference on Information Communications, ser. INFOCOM’10, 2010, pp. 983–991.
-
(2010)
Proceedings of the 29th conference on Information Communications, ser. INFOCOM’10
, pp. 983-991
-
-
Dell’Amico, M.1
Michiardi, P.2
Roudier, Y.3
-
30
-
-
0000250265
-
Measures of the Amount of Ecologic Association Between Species
-
Jul
-
L. R. Dice, “Measures of the Amount of Ecologic Association Between Species,” Ecology, vol. 26, no. 3, pp. 297–302, Jul. 1945.
-
(1945)
Ecology
, vol.26
, Issue.3
, pp. 297-302
-
-
Dice, L. R.1
-
31
-
-
84868357566
-
It’s Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit origin
-
S. Egelman, J. Bonneau, S. Chiasson, D. Dittrich, and S. Schechter, “It’s Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit origin,” in Proceedings of the 3rd Workshop on Ethics in Computer Security Research, ser. WECSR’12, 2012, pp. 124–132.
-
(2012)
Proceedings of the 3rd Workshop on Ethics in Computer Security Research, ser. WECSR’12
, pp. 124-132
-
-
Egelman, S.1
Bonneau, J.2
Chiasson, S.3
Dittrich, D.4
Schechter, S.5
-
34
-
-
84865012140
-
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
-
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, and J. Lopez, “Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms,” in Proceedings of the 33rd IEEE Symposium on Security and Privacy, ser. SP’12, 2012, pp. 523–537.
-
(2012)
Proceedings of the 33rd IEEE Symposium on Security and Privacy, ser. SP’12
, pp. 523-537
-
-
Kelley, P. G.1
Komanduri, S.2
Mazurek, M. L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L. F.8
Lopez, J.9
-
35
-
-
79958161706
-
Of Passwords and People: Measuring the Effect of Password-Composition Policies
-
S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman, “Of Passwords and People: Measuring the Effect of Password-Composition Policies,” in Proceedings of the International Conference on Human Factors in Computing Systems, ser. CHI’11, 2011, pp. 2595–2604.
-
(2011)
Proceedings of the International Conference on Human Factors in Computing Systems, ser. CHI’11
, pp. 2595-2604
-
-
Komanduri, S.1
Shay, R.2
Kelley, P. G.3
Mazurek, M. L.4
Bauer, L.5
Christin, N.6
Cranor, L. F.7
Egelman, S.8
-
37
-
-
84937155444
-
Distance between Sets
-
M. Levandowsky and D. Winter, “Distance between Sets,” Nature, vol. 234, no. 5, pp. 34–34, 1971.
-
(1971)
Nature
, vol.234
, Issue.5
, pp. 34-34
-
-
Levandowsky, M.1
Winter, D.2
-
38
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
V. I. Levenshtein, “Binary codes capable of correcting deletions, insertions, and reversals,” Soviet Physics Doklady, vol. 10, no. 8, pp. 707–710, 1966.
-
(1966)
Soviet Physics Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V. I.1
-
40
-
-
0014757386
-
A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins
-
S. B. Needleman and C. D. Wunsch, “A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins,” Journal of Molecular Biology, vol. 48, no. 3, pp. 443–453, 1970.
-
(1970)
Journal of Molecular Biology
, vol.48
, Issue.3
, pp. 443-453
-
-
Needleman, S. B.1
Wunsch, C. D.2
-
41
-
-
84959406256
-
Adaptive Password-Strength Meters from Markov Models
-
D. Perito, C. Castelluccia, and M. Duermuth, “Adaptive Password-Strength Meters from Markov Models,” in Proceedings of the 19th Network and Distributed Systems Security Symposium, ser. NDSS’12, 2012.
-
(2012)
Proceedings of the 19th Network and Distributed Systems Security Symposium, ser. NDSS’12
-
-
Perito, D.1
Castelluccia, C.2
Duermuth, M.3
-
43
-
-
84863469085
-
Stronger Password Authentication Using Browser Extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell, “Stronger Password Authentication Using Browser Extensions,” in Proceedings of the 14th conference on USENIX Security Symposium, ser. USENIX-SS ’05, 2005.
-
(2005)
Proceedings of the 14th conference on USENIX Security Symposium, ser. USENIX-SS ’05
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J. C.5
-
44
-
-
79958145496
-
Encountering Stronger Password Requirements: User Attitudes and Behaviors
-
R. Shay, S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor, “Encountering Stronger Password Requirements: User Attitudes and Behaviors,” in Proceedings of the 6th Symposium on Usable Privacy and Security, ser. SOUPS’10, 2010, pp. 1–20.
-
(2010)
Proceedings of the 6th Symposium on Usable Privacy and Security, ser. SOUPS’10
, pp. 1-20
-
-
Shay, R.1
Komanduri, S.2
Kelley, P. G.3
Leon, P. G.4
Mazurek, M. L.5
Bauer, L.6
Christin, N.7
Cranor, L. F.8
-
45
-
-
0019887799
-
Identification of Common Molecular Subsequences
-
T. Smith and M. Waterman, “Identification of Common Molecular Subsequences,” Journal of Molecular Biology, vol. 147, no. 1, pp. 195–197, 1981.
-
(1981)
Journal of Molecular Biology
, vol.147
, Issue.1
, pp. 195-197
-
-
Smith, T.1
Waterman, M.2
-
46
-
-
84979173757
-
How does your password measure up? The effect of strength meters on password creation
-
USENIX Association
-
B. Ur, P. G. Kelley, S. Komanduri, J. Lee, M. Maass, M. L. Mazurek, T. Passaro, R. Shay, T. Vidas, L. Bauer, N. Christin, and L. F. Cranor, “How does your password measure up? The effect of strength meters on password creation,” in Proceedings of the 21st USENIX conference on Security symposium, ser. USENIX-SS’12. USENIX Association, 2012, pp. 65–80.
-
(2012)
Proceedings of the 21st USENIX conference on Security symposium, ser. USENIX-SS’12
, pp. 65-80
-
-
Ur, B.1
Kelley, P. G.2
Komanduri, S.3
Lee, J.4
Maass, M.5
Mazurek, M. L.6
Passaro, T.7
Shay, R.8
Vidas, T.9
Bauer, L.10
Christin, N.11
Cranor, L. F.12
-
47
-
-
78650022232
-
Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern, “Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords,” in Proceedings of the 17th ACM conference on Computer and Communications Security, ser. CCS’10, 2010, pp. 162–175.
-
(2010)
Proceedings of the 17th ACM conference on Computer and Communications Security, ser. CCS’10
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
48
-
-
70449688216
-
Password Cracking Using Probabilistic Context-Free Grammars
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek, “Password Cracking Using Probabilistic Context-Free Grammars,” in Proceedings of the 30th IEEE Symposium on Security and Privacy, ser. SP’09, 2009, pp. 391–405.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy, ser. SP’09
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
de Medeiros, B.3
Glodek, B.4
-
49
-
-
78650011800
-
The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis
-
Y. Zhang, F. Monrose, and M. K. Reiter, “The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis,” in Proceedings of the 17th ACM conference on Computer and communications security, ser. CCS’10, 2010, pp. 176–186.
-
(2010)
Proceedings of the 17th ACM conference on Computer and communications security, ser. CCS’10
, pp. 176-186
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M. K.3
|