Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
Biometric cryptosystems: issues and challenges
In traditional cryptosystems, user authentication is based on possession of secret keys; the
method falls apart if the keys are not kept secret (ie, shared with non-legitimate users) …
method falls apart if the keys are not kept secret (ie, shared with non-legitimate users) …
Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
The science of guessing: analyzing an anonymized corpus of 70 million passwords
J Bonneau - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
We report on the largest corpus of user-chosen passwords ever studied, consisting of
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …
[图书][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[PDF][PDF] Smudge attacks on smartphone touch screens
Touch screens are an increasingly common feature on personal computing devices,
especially smartphones, where size and user interface advantages accrue from …
especially smartphones, where size and user interface advantages accrue from …
Passwords and the evolution of imperfect authentication
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
Encrypted key exchange: Password-based protocols secure against dictionary attacks
SM Bellovin, M Merritt - 1992 - academiccommons.columbia.edu
Classic cryptographic protocols based on user-chosen keys allow an attacker to mount
password-guessing attacks. A combination of asymmetric (public-key) and symmetric (secret …
password-guessing attacks. A combination of asymmetric (public-key) and symmetric (secret …
[图书][B] Computer security: principles and practice
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …
programmers, system managers, network managers, product marketing personnel, system …
Hide and seek: An introduction to steganography
N Provos, P Honeyman - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Although people have hidden secrets in plain sight-now called steganography-throughout
the ages, the recent growth in computational power and technology has propelled it to the …
the ages, the recent growth in computational power and technology has propelled it to the …