Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Biometric cryptosystems: issues and challenges

U Uludag, S Pankanti, S Prabhakar… - Proceedings of the …, 2004 - ieeexplore.ieee.org
In traditional cryptosystems, user authentication is based on possession of secret keys; the
method falls apart if the keys are not kept secret (ie, shared with non-legitimate users) …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

The science of guessing: analyzing an anonymized corpus of 70 million passwords

J Bonneau - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
We report on the largest corpus of user-chosen passwords ever studied, consisting of
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[PDF][PDF] Smudge attacks on smartphone touch screens

AJ Aviv, K Gibson, E Mossop, M Blaze… - 4th USENIX workshop on …, 2010 - usenix.org
Touch screens are an increasingly common feature on personal computing devices,
especially smartphones, where size and user interface advantages accrue from …

Passwords and the evolution of imperfect authentication

J Bonneau, C Herley, PC Van Oorschot… - Communications of the …, 2015 - dl.acm.org
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …

Encrypted key exchange: Password-based protocols secure against dictionary attacks

SM Bellovin, M Merritt - 1992 - academiccommons.columbia.edu
Classic cryptographic protocols based on user-chosen keys allow an attacker to mount
password-guessing attacks. A combination of asymmetric (public-key) and symmetric (secret …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Hide and seek: An introduction to steganography

N Provos, P Honeyman - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Although people have hidden secrets in plain sight-now called steganography-throughout
the ages, the recent growth in computational power and technology has propelled it to the …