Generation of Secure and Reliable Honeywords, Preventing False Detection
Citations
15 citations
11 citations
6 citations
4 citations
Cites methods from "Generation of Secure and Reliable H..."
...[7], [10]–[12]) that only evaluate the flatness of their methods using heuristic security arguments....
[...]
3 citations
References
88 citations
86 citations
"Generation of Secure and Reliable H..." refers background in this paper
...Authors in [27], [28] show that humans are capable of learning random strings over time through spaced repetition....
[...]
74 citations
"Generation of Secure and Reliable H..." refers background or methods in this paper
...As mentioned in [18], the list of 10000 most commonly used passwords [21] includes the following...
[...]
...However, according to [18], most of the passwords are simple combinations of digits, alphabets and special characters and not the tough nuts....
[...]
...There exist a few works [16], [18], [20] on the analysis of...
[...]
...The authors in [18] further explain that with the modeling syntax method, it is easy to distin-...
[...]
...As suggested in [18], we can limit the number of login attempts that can bemade using honeywords in a certain period of time....
[...]
41 citations
"Generation of Secure and Reliable H..." refers background in this paper
...User selected passwords are mostly predictable, since humans have a tendency to choose non-random and easy to remember passwords [1]....
[...]
32 citations
"Generation of Secure and Reliable H..." refers background in this paper
...Authors in [27], [28] show that humans are capable of learning random strings over time through spaced repetition....
[...]