Author:
Shukla Varun,Dixit Shivani,Kumar Ravi,Patidar Manish
Publisher
Springer International Publishing
Reference27 articles.
1. Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of applied cryptography, 5th edn. CRC Press Inc., USA (2001)
2. Shukla, V., Chaturvedi, A., Srivastava, N.: A secure stop and wait communication protocol for disturbed networks. Wireless Pers. Commun. 110, 861–872 (2019). https://doi.org/10.1007/s11277-019-06760-w
3. Shukla, V., Chaturvedi, A., Misra, M.K.: On authentication schemes using polynomials over non commutative rings. Wireless Pers. Commun. 118(1), 185–193 (2021). https://doi.org/10.1007/s11277-020-08008-4
4. Chou, H.C., Lee, H.C., Yu, H.J., Lai, F.P., Huang, K.H., Hsueh, C.W.: Password cracking based on learned patterns from disclosed passwords. Int. J. Innovative Comput., Inform. Control 9(2), 821–839 (2013). https://core.ac.uk/download/pdf/225229085.pdf
5. Yu, F., Huang, Y.: An overview of study of password cracking. In: International conference on computer science and mechanical automation, pp. 25–29 (2015). https://doi.org/10.1109/CSMA.2015.12