Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
zxcvbn:{Low-Budget} password strength estimation
DL Wheeler - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
zxcvbn: Low-Budget Password Strength Estimation Page 1 This paper is included in the
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …
Do users' perceptions of password security match reality?
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …
passwords are predictable is not well understood. We investigate the relationship between …
Birthday, name and bifacial-security: understanding passwords of Chinese web users
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …
few studies have examined how non-English speaking users select passwords. In this …
A comprehensive comparison of multiparty secure additions with differential privacy
S Goryczka, L **ong - IEEE transactions on dependable and …, 2015 - ieeexplore.ieee.org
This paper considers the problem of secure data aggregation (mainly summation) in a
distributed setting, while ensuring differential privacy of the result. We study secure …
distributed setting, while ensuring differential privacy of the result. We study secure …
OMEN: Faster password guessing using an ordered markov enumerator
Passwords are widely used for user authentication, and will likely remain in use in the
foreseeable future, despite several weaknesses. One important weakness is that human …
foreseeable future, despite several weaknesses. One important weakness is that human …
Code coverage and test suite effectiveness: Empirical study with real bugs in large systems
During software maintenance, testing is a crucial activity to ensure the quality of program
code as it evolves over time. With the increasing size and complexity of software, adequate …
code as it evolves over time. With the increasing size and complexity of software, adequate …
A study of personal information in human-chosen passwords and its security implications
Though not recommended, Internet users often include parts of personal information in their
passwords for easy memorization. However, the use of personal information in passwords …
passwords for easy memorization. However, the use of personal information in passwords …
Chunk-level password guessing: Towards modeling refined password composition representations
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …
suitable password composition representation is an influential factor. Unfortunately, the …
No single silver bullet: Measuring the accuracy of password strength meters
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …
password strength meter (PSM) to provide real-time strength feedback upon user …