Proceedings of the 28th Annual Computer Security Applications Conference 2012
DOI: 10.1145/2420950.2420966
|View full text |Cite
|
Sign up to set email alerts
|

Building better passwords using probabilistic techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
35
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 41 publications
(37 citation statements)
references
References 17 publications
0
35
0
2
Order By: Relevance
“…Houshmand and Aggrawal [18] derived Markov-based password cracking algorithm from MarkovChain that representatively originated PageRank algorithm. Originally, Markov-based algorithm is not a probabilistic model; Ma et al [25] investigated password characteristics about length and the structure of 6 datasets, 3 of which were from Chinese websites and improved it by using different normalization and smoothing methods.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Houshmand and Aggrawal [18] derived Markov-based password cracking algorithm from MarkovChain that representatively originated PageRank algorithm. Originally, Markov-based algorithm is not a probabilistic model; Ma et al [25] investigated password characteristics about length and the structure of 6 datasets, 3 of which were from Chinese websites and improved it by using different normalization and smoothing methods.…”
Section: Related Workmentioning
confidence: 99%
“…Ad hoc metrics (password strength meter) had already been demonstrated far from accurate by Weir et al [27]; they advocated that the cracking-based password strength meter was more compelling. Markov-based PSM [28] and PCFG-based PSM [18] were proposed subsequently based on Markov model and PCFG model. Wang et al [12] created a novel PSM on a solid foundation where user usually reuses one of his/her passwords rather than creating a new one.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…El problema que se presenta es que a pesar de que actualmente se cuenta con herramientas para la generación de contraseñas como "Random Password Generator" [7] o el Analyzer and Modifier for Passwords (AMP) 2 [8] que ayudan al usuario a generar contraseñas robustas manteniendo la usabilidad, y herramientas que generan claves aleatorias [9] o pseudoaleatorias [10], se siguen teniendo dificultades con el manejo de las mismas por parte del usuario final. Sin embargo, existe otra mirada como se observa en varias publicaciones de revistas científicas tipo A como la IEEE y ACM según estudios como [8] [15], centrados en la generación de contraseñas no a partir de programas ya que esto conlleva a tener problemas de seguridad por parte de los usuarios, sino a establecer el uso de políticas que permitan la generación de claves seguras y con un alto grado de usabilidad por parte de quien las va a utilizar.…”
Section: Introductionunclassified
“…Sin embargo, existe otra mirada como se observa en varias publicaciones de revistas científicas tipo A como la IEEE y ACM según estudios como [8] [15], centrados en la generación de contraseñas no a partir de programas ya que esto conlleva a tener problemas de seguridad por parte de los usuarios, sino a establecer el uso de políticas que permitan la generación de claves seguras y con un alto grado de usabilidad por parte de quien las va a utilizar.…”
Section: Introductionunclassified