Understanding Password Database Compromises

@inproceedings{Mirante2013UnderstandingPD,
  title={Understanding Password Database Compromises},
  author={Dennis Mirante and Justin Cappos},
  year={2013}
}
The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of any of the sponsors. 
Highly Cited
This paper has 31 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 24 extracted citations

Some Remarks on Honeyword Based Password-Cracking Detection

IACR Cryptology ePrint Archive • 2014
View 2 Excerpts
Highly Influenced

A Novel Approach for Protecting Legacy Authentication Databases in Consideration of GDPR

2018 International Symposium on Networks, Computers and Communications (ISNCC) • 2018
View 3 Excerpts

Achieving Flatness: with Video Captcha, Location Tracking, Selecting the Honeywords

2018 International Conference on Smart City and Emerging Technology (ICSCET) • 2018

A novel approach for secure identity authentication in legacy database systems

2017 28th Irish Signals and Systems Conference (ISSC) • 2017
View 3 Excerpts

Analysis of Authentication on Online Purchase Using Honey Password

2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) • 2017
View 1 Excerpt

Elastic password: A new mechanism for strengthening passwords using time delays between keystrokes

2017 8th International Conference on Information and Communication Systems (ICICS) • 2017
View 2 Excerpts

Similar Papers

Loading similar papers…