Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

[BOK][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

A blockchain-based multi-CA cross-domain authentication scheme in decentralized autonomous network

M Wang, L Rui, Y Yang, Z Gao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The continuous development of network technology has driven the emergence of smart
devices, and the demand for smart devices interconnection has increased sharply, which …

Cross-domain authentication scheme for vehicles based on given virtual identities

Y Chen, J Zhang, X Wei, Y Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The advancement of intelligent transportation systems has enhanced both vehicle ad hoc
networks (VANETs) and road safety. However, traditional cross-domain scenarios in …

On the implications of Zipf's law in passwords

D Wang, P Wang - European Symposium on Research in Computer …, 2016 - Springer
Textual passwords are perhaps the most prevalent mechanism for access control over the
Internet. Despite the fact that human-beings generally select passwords in a highly skewed …

[HTML][HTML] Password-hashing status

G Hatzivasilis - Cryptography, 2017 - mdpi.com
Computers are used in our everyday activities, with high volumes of users accessing
provided services. One-factor authentication consisting of a username and a password is the …

Forward secrecy of SPAKE2

J Becerra, D Ostrev, M Škrobot - … ProvSec 2018, Jeju, South Korea, October …, 2018 - Springer
Abstract Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2)
protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for …

Password hashing competition-survey and benchmark

G Hatzivasilis, I Papaefstathiou… - Cryptology ePrint …, 2015 - eprint.iacr.org
Password hashing is the common approach for maintaining users' password-related
information that is later used for authentication. A hash for each password is calculated and …

CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks

Y Li, W Chen, Z Cai, Y Fang - Wireless Networks, 2016 - Springer
Due to the flexibility of wireless mesh networks (WMNs) to form the backhaul subnetworks,
future generation networks may have to integrate various kinds of WMNs under possibly …

Checks and balances: A tripartite public key infrastructure for secure web-based connections

J Chen, S Yao, Q Yuan, R Du… - IEEE INFOCOM 2017 …, 2017 - ieeexplore.ieee.org
Recent real-world attacks against Certification Authorities (CAs) and fraudulently issued
certificates arouse the public to rethink the security of public key infrastructure for web-based …