[KSIĄŻKA][B] Understanding Bitcoin: Cryptography, engineering and economics

P Franco - 2014 - books.google.com
Discover Bitcoin, the cryptocurrency that has the finance world buzzing Bitcoin is arguably
one of the biggest developments in finance since the advent of fiat currency. With …

" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab

B Ur, F Noma, J Bees, SM Segreti, R Shay… - Eleventh symposium on …, 2015 - usenix.org
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …

[KSIĄŻKA][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks

S Jarecki, H Krawczyk, J Xu - … 37th Annual International Conference on the …, 2018 - Springer
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow two parties that
only share a password to establish a shared key in a way that is immune to offline attacks …

Do users' perceptions of password security match reality?

B Ur, J Bees, SM Segreti, L Bauer, N Christin… - Proceedings of the …, 2016 - dl.acm.org
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …

Why do developers get password storage wrong? A qualitative usability study

A Naiakshina, A Danilova, C Tiefenau… - Proceedings of the …, 2017 - dl.acm.org
Passwords are still a mainstay of various security systems, as well as the cause of many
usability issues. For end-users, many of these issues have been studied extensively …

House of Graphs 2.0: A database of interesting graphs and more

K Coolsaet, S D'hondt, J Goedgebeur - Discrete Applied Mathematics, 2023 - Elsevier
In 2012 we announced “the House of Graphs”(https://houseofgraphs. org)(Brinkmann et al.
2013), which was a new database of graphs. The House of Graphs hosts complete lists of …

On bitcoin as a public randomness source

J Bonneau, J Clark, S Goldfeder - Cryptology ePrint Archive, 2015 - eprint.iacr.org
We formalize the use of Bitcoin as a source of publicly-verifiable randomness. As a side-
effect of Bitcoin's proof-of-work-based consensus system, random values are broadcast …

Measuring {Real-World} Accuracies and Biases in Modeling Password Guessability

B Ur, SM Segreti, L Bauer, N Christin… - 24th USENIX Security …, 2015 - usenix.org
Parameterized password guessability—how many guesses a particular cracking algorithm
with particular training data would take to guess a password—has become a common metric …

An {Administrator's} Guide to Internet Password Research

D Florêncio, C Herley, PC Van Oorschot - 28th large installation system …, 2014 - usenix.org
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …