Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A research agenda acknowledging the persistence of passwords
Despite countless attempts and near-universal desire to replace them, passwords are more
widely used and firmly entrenched than ever. The authors' exploration leads them to argue …
widely used and firmly entrenched than ever. The authors' exploration leads them to argue …
A usability study of five {two-factor} authentication methods
K Reese, T Smith, J Dutson, J Armknecht… - Fifteenth symposium on …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …
with 2FA typically requires an individual to authenticate using something they know …
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
[PDF][PDF] The tangled web of password reuse.
Today's Internet services rely heavily on text-based passwords for user authentication. The
pervasiveness of these services coupled with the difficulty of remembering large numbers of …
pervasiveness of these services coupled with the difficulty of remembering large numbers of …
The science of guessing: analyzing an anonymized corpus of 70 million passwords
J Bonneau - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
We report on the largest corpus of user-chosen passwords ever studied, consisting of
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …
Passwords and the evolution of imperfect authentication
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
zxcvbn:{Low-Budget} password strength estimation
DL Wheeler - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
zxcvbn: Low-Budget Password Strength Estimation Page 1 This paper is included in the
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …
Honeywords: Making password-cracking detectable
We propose a simple method for improving the security of hashed passwords: the
maintenance of additional``honeywords''(false passwords) associated with each user's …
maintenance of additional``honeywords''(false passwords) associated with each user's …
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to
computer systems. To prevent users from picking passwords that are too easy for an …
computer systems. To prevent users from picking passwords that are too easy for an …
Testing metrics for password creation policies by attacking large sets of revealed passwords
In this paper we attempt to determine the effectiveness of using entropy, as defined in NIST
SP800-63, as a measurement of the security provided by various password creation …
SP800-63, as a measurement of the security provided by various password creation …