Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the economics of offline password cracking
We develop an economic model of an offline password cracker which allows us to make
quantitative predictions about the fraction of accounts that a rational password attacker …
quantitative predictions about the fraction of accounts that a rational password attacker …
Towards reliable storage of 56-bit secrets in human memory
J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
T/key: Second-factor authentication from secure hash chains
Time-based one-time password (TOTP) systems in use today require storing secrets on both
the client and the server. As a result, an attack on the server can expose all second factors …
the client and the server. As a result, an attack on the server can expose all second factors …
An empirical study of mnemonic sentence-based password generation strategies
Mnemonic strategy has been recommended to help users generate secure and memorable
passwords. We evaluated the security of 6 mnemonic strategy variants in a series of online …
passwords. We evaluated the security of 6 mnemonic strategy variants in a series of online …
Spaced repetition and mnemonics enable recall of multiple strong passwords
We report on a user study that provides evidence that spaced repetition and a specific
mnemonic technique enable users to successfully recall multiple strong passwords over …
mnemonic technique enable users to successfully recall multiple strong passwords over …
Method and system of providing a picture password proof of knowledge as a web service
RH Thibadeau, JD Donnell - US Patent 9,813,411, 2017 - Google Patents
6, 249, 868 B16/2001 Sherman et al. 6, 411, 283 B1 6/2002 Murphy 6, 658, 328 B1 12/2003
Alrabady et al. 6, 934, 860 B1 8/2005 Goldstein 6, 983, 065 B1 1/2006 Akgul et al. 7, 243 …
Alrabady et al. 6, 934, 860 B1 8/2005 Goldstein 6, 983, 065 B1 1/2006 Akgul et al. 7, 243 …
CASH: A cost asymmetric secure hash algorithm for optimal password protection
An adversary who has obtained the cryptographic hash of a user's password can mount an
offline attack to crack the password by comparing this hash value with the cryptographic …
offline attack to crack the password by comparing this hash value with the cryptographic …
Changing users' security behaviour towards security questions: A game based learning approach
N Micallef, NAG Arachchilage - 2017 Military Communications …, 2017 - ieeexplore.ieee.org
Fallback authentication is used to retrieve forgotten passwords. Security questions are one
of the main techniques used to conduct fallback authentication. In this paper, we propose a …
of the main techniques used to conduct fallback authentication. In this paper, we propose a …
A Gamified Approach to Improve Users' Memorability of Fall-back Authentication.
N Micallef, NAG Arachchilage - SOUPS, 2017 - usenix.org
Security questions are one of the techniques used in fall-back authentication to retrieve
forgotten passwords. This paper proposes a game design which aims to improve usability of …
forgotten passwords. This paper proposes a game design which aims to improve usability of …
Publishable humanly usable secure password creation schemas
M Blum, S Vempala - Proceedings of the AAAI Conference on Human …, 2015 - ojs.aaai.org
What can a human compute in his/her head that a powerful adversary cannot infer? To
answer this question, we define a model of human computation and a measure of security …
answer this question, we define a model of human computation and a measure of security …