Proactive password checking with decision trees
Proceedings of the 4th ACM conference on Computer and communications security
High dictionary compression for proactive password checking
ACM Transactions on Information and System Security (TISSEC)
Natural language processing for information assurance and security: an overview and implementations
Proceedings of the 2000 workshop on New security paradigms
A note on proactive password checking
Proceedings of the 2001 workshop on New security paradigms
Securing passwords against dictionary attacks
Proceedings of the 9th ACM conference on Computer and communications security
Practical Key Recovery Schemes
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ISC '01 Proceedings of the 4th International Conference on Information Security
HYPPOCRATES: a new proactive password checker
Journal of Systems and Software
Payload attribution via hierarchical bloom filters
Proceedings of the 11th ACM conference on Computer and communications security
Building high accuracy bloom filters using partitioned hashing
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
On predictive models and user-drawn graphical passwords
ACM Transactions on Information and System Security (TISSEC)
Human-seeded attacks and exploiting hot-spots in graphical passwords
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Optimizing data popularity conscious bloom filters
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
A biologically inspired password authentication system
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
An Optimal Bloom Filter Replacement Based on Matrix Solving
CSR '09 Proceedings of the Fourth International Computer Science Symposium in Russia on Computer Science - Theory and Applications
The security of modern password expiration: an algorithmic framework and empirical analysis
Proceedings of the 17th ACM conference on Computer and communications security
Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
A Generalized Bloom Filter to Secure Distributed Network Applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
COCA filters: co-occurrence aware bloom filters
SPIRE'11 Proceedings of the 18th international conference on String processing and information retrieval
EnFilter: a password enforcement and filter tool based on pattern recognition techniques
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
md5bloom: Forensic filesystem hashing revisited
Digital Investigation: The International Journal of Digital Forensics & Incident Response
The benefits of understanding passwords
HotSec'12 Proceedings of the 7th USENIX conference on Hot Topics in Security
Security analysis of a secure and practical dynamic identity-based remote user authentication scheme
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Building better passwords using probabilistic techniques
Proceedings of the 28th Annual Computer Security Applications Conference
A novel approach for leveraging co-occurrence to improve the false positive error in signature files
Journal of Discrete Algorithms
Hi-index | 0.00 |