Proceedings of the 3rd International Conference on Security of Information and Networks 2010
DOI: 10.1145/1854099.1854113
|View full text |Cite
|
Sign up to set email alerts
|

The weak and the strong password preferences

Abstract: Considering the computer authentication, any password shall not only be private to its owner but also be chosen as not to be predicted easily by others. The passwords used in authentication processes of any critical system should be strong as not to be cracked easily. In this context, the strong password choice gets significance for the general system security. This study aims to reveal the proper and improper properties on password preferences via examining the real samples. The method used in this work is fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…For hackers, however, this is very important because they can use a brute force attack easily. Base on this, a time-effective approach is to think about the candidates that are to be the actual words, patterns, or combination of the characters, which are not difficult to remember [6].…”
Section: B Hacking Approachesmentioning
confidence: 99%
See 4 more Smart Citations
“…For hackers, however, this is very important because they can use a brute force attack easily. Base on this, a time-effective approach is to think about the candidates that are to be the actual words, patterns, or combination of the characters, which are not difficult to remember [6].…”
Section: B Hacking Approachesmentioning
confidence: 99%
“…The target of hacking tools is two object: passwords and the function for administrators to reactively check the passwords used in the system. The reactive checking may increase the system security by finding the easy to hack passwords and by warning the related uses to change their passwords to prevent their accounts from being cracked by intruders [6]. John the Ripper and Hashcat [8], [9] are the tools to do the analysis and provide information on methods used by hackers.…”
Section: Hacking Toolsmentioning
confidence: 99%
See 3 more Smart Citations