OPUS: preventing weak password choices
Computers and Security
Proactive password checking with decision trees
Proceedings of the 4th ACM conference on Computer and communications security
High dictionary compression for proactive password checking
ACM Transactions on Information and System Security (TISSEC)
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Number theoretic attacks on secure password schemes
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Password Memorability and Security: Empirical Results
IEEE Security and Privacy
Improving interface designs to help users choose better passwords
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Pass-thoughts: authenticating with our minds
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Proceedings of the 43rd annual Southeast regional conference - Volume 2
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Neural Network Techniques for Proactive Password Checking
IEEE Transactions on Dependable and Secure Computing
Graphical dictionaries and the memorable space of graphical passwords
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On predictive models and user-drawn graphical passwords
ACM Transactions on Information and System Security (TISSEC)
Password policy simulation and analysis
Proceedings of the 2007 ACM workshop on Digital identity management
Do background images improve "draw a secret" graphical passwords?
Proceedings of the 14th ACM conference on Computer and communications security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Security and usability: the gap in real-world online banking
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Password strength: an empirical analysis
INFOCOM'10 Proceedings of the 29th conference on Information communications
The weak and the strong password preferences: a case study on turkish users
Proceedings of the 3rd international conference on Security of information and networks
The security of modern password expiration: an algorithmic framework and empirical analysis
Proceedings of the 17th ACM conference on Computer and communications security
Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
EnFilter: a password enforcement and filter tool based on pattern recognition techniques
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
How does your password measure up? the effect of strength meters on password creation
Security'12 Proceedings of the 21st USENIX conference on Security symposium
The benefits of understanding passwords
HotSec'12 Proceedings of the 7th USENIX conference on Hot Topics in Security
Building better passwords using probabilistic techniques
Proceedings of the 28th Annual Computer Security Applications Conference
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.03 |
Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In this paper, a new approach is proposed to deal with this new class of weak passwords by (roughly) measuring entropy. A simple example is given to exploit effective patterns to prevent low-entropy passwords as the first step of entropy-based proactive password checking.