Human selection of mnemonic phrase-based passwords

C Kuo, S Romanosky, LF Cranor - … of the second symposium on Usable …, 2006 - dl.acm.org
Textual passwords are often the only mechanism used to authenticate users of a networked
system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to …

Ersatzpasswords: Ending password cracking and detecting password leakage

MH Almeshekah, CN Gutierrez, MJ Atallah… - Proceedings of the 31st …, 2015 - dl.acm.org
In this work we present a simple, yet effective and practical, scheme to improve the security
of stored password hashes, rendering their cracking detectable and insuperable at the same …

Using deception to enhance security: A Taxonomy, Model, and Novel Uses

MH Almeshekah - 2015 - search.proquest.com
As the convergence between our physical and digital worlds continue at a rapid pace,
securing our digital information is vital to our prosperity. Most current typical computer …

[PDF][PDF] Distributed metastasis: a computer network penetration methodology

AJ Stewart - Phrack Magazine, 1999 - redirect.cs.umbc.edu
Metastasis refers to the process by which an attacker propagates a computer penetration
throughout a computer network. The traditional methodology for Internet computer …

[PDF][PDF] A wristwatch-computer based password-vault

G Blasko, C Narayanaswami, M Raghunath - IBM Technical Report …, 2005 - Citeseer
Passwords are a popular means of access control to internet services. Unfortunately, during
the last few years there has been a proliferation of services that any single individual …

All in a day's work: Password cracking for the rest of us

JW Blakstad, R Nergård, MG Jaatun… - … : NISK 2: 2009: NTNU …, 2009 - ntnuopen.ntnu.no
The majority of computer systems are still protected primarily with a user name and
password, and many users employ the same password on multiple systems. Additionally …

[PDF][PDF] Ersatzpasswords–ending password cracking

MH Almeshekah, CN Gutierrez, MJ Atallah… - 2015 - cerias.purdue.edu
In this work we present a simple, yet effective and practical, scheme to improve the security
of stored password hashes rendering their cracking detectable and insuperable at the same …

[PDF][PDF] CERIAS Tech Report 2015-11 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses

MH Almeshekah - 2015 - cerias.purdue.edu
Most data is digitized and stored in organizations' servers, making them a valuable target.
Advanced persistent threats (APT), corporate espionage, and other forms of attacks are …

Long-chain molecule analog as key in secure active encoding for access control and encryption

CR Costanzo - 2008 - search.proquest.com
Whereas the science of cryptography can trace its origins back thousands of years, the
increasing reliance of militaries, businesses and individuals on electronically stored and …

Procedures and Tools to Reset or Recover the Administrator Password on Popular Operating Systems

JW Blakstad, RW Nergård - 2009 - ntnuopen.ntnu.no
Unauthorized access to computers and theft of proprietary information are two problems
leading to large economical losses for organizations around the world. Thousands of …