Author:
Murata Issei,He Pengju,Gu Yujie,Sakurai Kouichi
Publisher
Springer Nature Switzerland
Reference12 articles.
1. Guan, Y., Zhang, Y., Chen, L., Bian, K.: A neural attack model for cracking passwords in adversarial environments. In: IEEE/CIC International Conference on Communications in China (ICCC), pp. 183–188 (2019)
2. Blocki, J., Blum, M., Datta, A., Vempala, S.: Towards human computable passwords. In: Innovations in Theoretical Computer Science (ITCS), pp. 10:1–10:47 (2017)
3. Blum, M., Vempala, S.: The complexity of human computation via a concrete model with an application to passwords. In: Proceedings of the National Academy of Sciences of the USA (PNAS), vol. 117, pp. 9208–9215 (2020)
4. Rosenfeld, E., Vempala, S., Blum, M.: Human-usable password schemas: Beyond information-theoretic security. arXiv:1906.00029 (2019)
5. Samadi, S., Vempala, S., Kalai, A.: Usability of humanly computable passwords. In: 6th AAAI Conference on Human Computation and Crowdsourcing (HCOMP), pp. 174–183 (2018)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing User Authentication with a Secure Human-Computable Password Scheme;2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE);2024-02-22