GOTCHA password hackers!

Author:

Blocki Jeremiah1,Blum Manuel1,Datta Anupam1

Affiliation:

1. Carnegie Mellon University, Pittsburgh, PA, USA

Publisher

ACM

Reference50 articles.

1. Rockyou hack: From bad to worse. http://techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/ December 2009. Retrieved 9/27/2012. Rockyou hack: From bad to worse. http://techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/ December 2009. Retrieved 9/27/2012.

2. Update on playstation network/qriocity services. http://blog.us.playstation.com/2011/04/22/update-on-playstation-network-qriocity-services/ April 2011. Retrieved 5/22/2012. Update on playstation network/qriocity services. http://blog.us.playstation.com/2011/04/22/update-on-playstation-network-qriocity-services/ April 2011. Retrieved 5/22/2012.

3. Data breach at ieee.org: 100k plaintext passwords. http://ieeelog.com/ September 2012. Retrieved 9/27/2012. Data breach at ieee.org: 100k plaintext passwords. http://ieeelog.com/ September 2012. Retrieved 9/27/2012.

4. An update on linkedin member passwords compromised. http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/ June 2012. Retrieved 9/27/2012. An update on linkedin member passwords compromised. http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/ June 2012. Retrieved 9/27/2012.

5. Zappos customer accounts breached. http://www.usatoday.com/tech/news/story/2012-01--16/mark-smith-zappos-breach-tips/52593484/1 January 2012. Retrieved 5/22/2012. Zappos customer accounts breached. http://www.usatoday.com/tech/news/story/2012-01--16/mark-smith-zappos-breach-tips/52593484/1 January 2012. Retrieved 5/22/2012.

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Towards designing robust CAPTCHAs;Journal of Computer Security;2018-10-30

2. Efficiently Computing Data-Independent Memory-Hard Functions;Advances in Cryptology – CRYPTO 2016;2016

3. GOTCHA Challenge (Un)Solved;Advances in Intelligent Systems and Computing;2015

4. Enhancing the Security of Image CAPTCHAs Through Noise Addition;ICT Systems Security and Privacy Protection;2015

5. GOTCHA password hackers!;Proceedings of the 2013 ACM workshop on Artificial intelligence and security;2013-11-04

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3