Publisher
Springer Nature Switzerland
Reference36 articles.
1. IBM security: Cost of a data breach report 2021 (2021). https://www.ibm.com/security/data-breach. Accessed 01 Jan 2022
2. Lecture Notes in Computer Science;H Bojinov,2010
3. Bonneau, J., Herley, C., Oorschot, P.C.V., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy (S &P), pp. 553–567 (2012). https://doi.org/10.1109/SP.2012.44
4. Brown, T., et al.: Language models are few-shot learners. In: Advances in Neural Information Processing Systems, vol. 33, pp. 1877–1901. Curran Associates, Inc. (2020). https://proceedings.neurips.cc/paper_files/paper/2020/file/1457c0d6bfcb4967418bfb8ac142f64a-Paper.pdf
5. Camenisch, J., Lehmann, A., Neven, G.: Optimal distributed password verification. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. CCS ’15, pp. 182–194. Association for Computing Machinery, New York, NY, USA (2015). https://doi.org/10.1145/2810103.2813722
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. How Password Strength Becomes a Weak Link for Honeywords;2023 11th International Conference in Software Engineering Research and Innovation (CONISOFT);2023-11-06
2. Beyond Chunking: Re-Engineering Password Segmentation for Better Honeywords;2023 11th International Conference in Software Engineering Research and Innovation (CONISOFT);2023-11-06
3. The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords;2023 IEEE Conference on Communications and Network Security (CNS);2023-10-02