Generation of Secure and Reliable Honeywords, Preventing False Detection
Citations
15 citations
11 citations
6 citations
4 citations
Cites methods from "Generation of Secure and Reliable H..."
...[7], [10]–[12]) that only evaluate the flatness of their methods using heuristic security arguments....
[...]
3 citations
References
304 citations
"Generation of Secure and Reliable H..." refers background in this paper
...related to user profile as mentioned in [26]....
[...]
...Another work on targeted user password guessing [26] leverages the tendency that majority of population uses personal details for choosing password....
[...]
264 citations
"Generation of Secure and Reliable H..." refers background or methods in this paper
...Tweaking [6] < 1=k weak no yes no no yes...
[...]
...2 OVERVIEW OF THE HONEYWORDS TECHNIQUE [6]...
[...]
...In [6], the authors have illustrated several flat or approximately flat Genðk; piÞ procedures that are discussed in Section 4....
[...]
...Take-a-tail [6] PDP [16] Append-sectret [this work]...
[...]
...Therefore, the Honeywords technique [6] is a significant contribution towards detecting breaches of the password database....
[...]
163 citations
126 citations
95 citations
"Generation of Secure and Reliable H..." refers methods in this paper
...According to an analysis given in [23], the error patterns in mini-QWERTY keyboard show the rate of human errors as: ‘Substitution’ errors - 40....
[...]