2019
DOI: 10.1109/tdsc.2018.2824323
|View full text |Cite
|
Sign up to set email alerts
|

Generation of Secure and Reliable Honeywords, Preventing False Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 15 publications
0
16
0
Order By: Relevance
“…When enrolling, the user selects a password-tail of t>1 from a selection of 1. alphabetic characters (a-z), and 2. digits in addition to the username and password (0 -9).  In 19 This study proposes a new honeyword creation strategy that incorporates all four methods. As a result, the system acquires four groups of honeywords generated from the following sources:…”
Section: Modified-uimentioning
confidence: 99%
“…When enrolling, the user selects a password-tail of t>1 from a selection of 1. alphabetic characters (a-z), and 2. digits in addition to the username and password (0 -9).  In 19 This study proposes a new honeyword creation strategy that incorporates all four methods. As a result, the system acquires four groups of honeywords generated from the following sources:…”
Section: Modified-uimentioning
confidence: 99%
“…A k s h i m a et al [48] suggested The "evolving-password model", the "user-profile model", and the "append-secret model" as enhanced and more functional honeyword generating methods.…”
Section: In 2018mentioning
confidence: 99%
“…In addition to the username and password, the user chooses a password-tail of t > 1 from a list of (1) alphabetic characters (a-z) and ( 2) digits upon enrolling (0-9). (iv) In [18], as new honeyword generation approaches, the "evolving-password model," "user-profile model," and "append-secret model" are suggested. (1) Evolving-password model: e following two separate computation steps can be utilized to finish the process: (a) Counting the number of times password patterns and tokens are used, and (b) generating honeywords from post frequencies and maintaining frequency lists.…”
Section: Related Workmentioning
confidence: 99%