Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
[BOK][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
A blockchain-based multi-CA cross-domain authentication scheme in decentralized autonomous network
M Wang, L Rui, Y Yang, Z Gao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The continuous development of network technology has driven the emergence of smart
devices, and the demand for smart devices interconnection has increased sharply, which …
devices, and the demand for smart devices interconnection has increased sharply, which …
Cross-domain authentication scheme for vehicles based on given virtual identities
Y Chen, J Zhang, X Wei, Y Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The advancement of intelligent transportation systems has enhanced both vehicle ad hoc
networks (VANETs) and road safety. However, traditional cross-domain scenarios in …
networks (VANETs) and road safety. However, traditional cross-domain scenarios in …
On the implications of Zipf's law in passwords
Textual passwords are perhaps the most prevalent mechanism for access control over the
Internet. Despite the fact that human-beings generally select passwords in a highly skewed …
Internet. Despite the fact that human-beings generally select passwords in a highly skewed …
[HTML][HTML] Password-hashing status
G Hatzivasilis - Cryptography, 2017 - mdpi.com
Computers are used in our everyday activities, with high volumes of users accessing
provided services. One-factor authentication consisting of a username and a password is the …
provided services. One-factor authentication consisting of a username and a password is the …
Forward secrecy of SPAKE2
Abstract Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2)
protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for …
protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for …
Password hashing competition-survey and benchmark
Password hashing is the common approach for maintaining users' password-related
information that is later used for authentication. A hash for each password is calculated and …
information that is later used for authentication. A hash for each password is calculated and …
CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks
Due to the flexibility of wireless mesh networks (WMNs) to form the backhaul subnetworks,
future generation networks may have to integrate various kinds of WMNs under possibly …
future generation networks may have to integrate various kinds of WMNs under possibly …
Checks and balances: A tripartite public key infrastructure for secure web-based connections
J Chen, S Yao, Q Yuan, R Du… - IEEE INFOCOM 2017 …, 2017 - ieeexplore.ieee.org
Recent real-world attacks against Certification Authorities (CAs) and fraudulently issued
certificates arouse the public to rethink the security of public key infrastructure for web-based …
certificates arouse the public to rethink the security of public key infrastructure for web-based …