Publisher
Springer Science and Business Media LLC
Reference42 articles.
1. Ji, S.; Yang, S.; Hu, X.; Han, W.; Li, Z.; Beyah, R.: Zero-sum password cracking game: a large-scale empirical study on the crackability, correlation, and security of passwords. IEEE Trans. Dependable Secur. comput. 14(5), 550–564 (2017)
2. Bošnjak, L; Sreš, J; Brumen, B.: Brute-force and dictionary attack on hashed real-world passwords. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1161–1166. IEEE (2018)
3. Ho, P.F.; Kam, Y.H.; Wee, M.C.; Chong, Y.N.; Yee, L.P.: Preventing shoulder-surfing attack with the concept of concealing the password objects’ information. Sci. World J. 2014, 838623 (2014). https://doi.org/10.1155/2014/838623
4. Gao, X; Yang, Y; Liu, C; Mitropoulos, C; Lindqvist, J; Oulasvirta, A.: Forgetting of passwords: ecological theory and data. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 221–238 (2018)
5. Pearman, S; Thomas, J; Naeini, P.E; Habib, H; Bauer, L; Christin, N; Cranor, L.F; Egelman, S; Forget, A.: Let’s go in for a closer look: Observing passwords in their natural habitat. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 295–310. ACM (2017)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献