Human selection of mnemonic phrase-based passwords
C Kuo, S Romanosky, LF Cranor - … of the second symposium on Usable …, 2006 - dl.acm.org
Textual passwords are often the only mechanism used to authenticate users of a networked
system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to …
system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to …
Ersatzpasswords: Ending password cracking and detecting password leakage
MH Almeshekah, CN Gutierrez, MJ Atallah… - Proceedings of the 31st …, 2015 - dl.acm.org
In this work we present a simple, yet effective and practical, scheme to improve the security
of stored password hashes, rendering their cracking detectable and insuperable at the same …
of stored password hashes, rendering their cracking detectable and insuperable at the same …
Using deception to enhance security: A Taxonomy, Model, and Novel Uses
MH Almeshekah - 2015 - search.proquest.com
As the convergence between our physical and digital worlds continue at a rapid pace,
securing our digital information is vital to our prosperity. Most current typical computer …
securing our digital information is vital to our prosperity. Most current typical computer …
[PDF][PDF] Distributed metastasis: a computer network penetration methodology
AJ Stewart - Phrack Magazine, 1999 - redirect.cs.umbc.edu
Metastasis refers to the process by which an attacker propagates a computer penetration
throughout a computer network. The traditional methodology for Internet computer …
throughout a computer network. The traditional methodology for Internet computer …
[PDF][PDF] A wristwatch-computer based password-vault
G Blasko, C Narayanaswami, M Raghunath - IBM Technical Report …, 2005 - Citeseer
Passwords are a popular means of access control to internet services. Unfortunately, during
the last few years there has been a proliferation of services that any single individual …
the last few years there has been a proliferation of services that any single individual …
All in a day's work: Password cracking for the rest of us
JW Blakstad, R Nergård, MG Jaatun… - … : NISK 2: 2009: NTNU …, 2009 - ntnuopen.ntnu.no
The majority of computer systems are still protected primarily with a user name and
password, and many users employ the same password on multiple systems. Additionally …
password, and many users employ the same password on multiple systems. Additionally …
[PDF][PDF] Ersatzpasswords–ending password cracking
MH Almeshekah, CN Gutierrez, MJ Atallah… - 2015 - cerias.purdue.edu
In this work we present a simple, yet effective and practical, scheme to improve the security
of stored password hashes rendering their cracking detectable and insuperable at the same …
of stored password hashes rendering their cracking detectable and insuperable at the same …
[PDF][PDF] CERIAS Tech Report 2015-11 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses
MH Almeshekah - 2015 - cerias.purdue.edu
Most data is digitized and stored in organizations' servers, making them a valuable target.
Advanced persistent threats (APT), corporate espionage, and other forms of attacks are …
Advanced persistent threats (APT), corporate espionage, and other forms of attacks are …
Long-chain molecule analog as key in secure active encoding for access control and encryption
CR Costanzo - 2008 - search.proquest.com
Whereas the science of cryptography can trace its origins back thousands of years, the
increasing reliance of militaries, businesses and individuals on electronically stored and …
increasing reliance of militaries, businesses and individuals on electronically stored and …
Procedures and Tools to Reset or Recover the Administrator Password on Popular Operating Systems
JW Blakstad, RW Nergård - 2009 - ntnuopen.ntnu.no
Unauthorized access to computers and theft of proprietary information are two problems
leading to large economical losses for organizations around the world. Thousands of …
leading to large economical losses for organizations around the world. Thousands of …