期刊文献+
共找到1,842篇文章
< 1 2 93 >
每页显示 20 50 100
TGI-FPR: An Improved Multi-Label Password Guessing Model
1
作者 Wei Ou Shuai Liu +3 位作者 Mengxue Pang Jianqiang Ma Qiuling Yue Wenbao Han 《Computers, Materials & Continua》 2025年第7期463-490,共28页
TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password secur... TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password security research.However,through an analysis of the vulnerable behavior of users when constructing passwords by combining popular passwords with their Personally Identifiable Information,we identified that the model fails to consider popular passwords and frequent substrings,and it uses overly broad personal information categories,with extensive duplicate statistics.To address these issues,we propose an improved password guessing model,TGI-FPR,which incorporates three semantic methods:(1)identification of popular passwords by generating top 300 lists from similar websites,(2)use of frequent substrings as new grammatical labels to capture finer-grained password structures,and(3)further subdivision of the six major categories of personal information.To evaluate the performance of the proposed model,we conducted experiments on six large-scale real-world password leak datasets and compared its accuracy within the first 100 guesses to that of TarGuess-I.The results indicate a 2.65%improvement in guessing accuracy. 展开更多
关键词 password analysis personally identifiable information frequent substring password guessing model
在线阅读 下载PDF
CMOS中PASSWORD的清除
2
作者 刘辉 吴赟 《微机发展》 1996年第2期14-15,共2页
本文介绍微机CMOS被加锁后的几种解锁方法
关键词 CMOS存储器 存储器 password CMOS
在线阅读 下载PDF
Password Pattern and Vulnerability Analysis for Web and Mobile Applications 被引量:1
3
作者 LI Shancang Imed Romdhani William Buchanan 《ZTE Communications》 2016年第B06期32-36,共5页
Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Sh... Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy and Minimum entropy. We show how to substantially improve upon the strength of passwords based on the analysis of text-password entropies. By analyzing the passwords datasets of Rockyou and 163.com, we believe strong password can be designed based on good usability, deployability, rememberbility, and security entropies. 展开更多
关键词 password strength security entropies password vulnerabilities
在线阅读 下载PDF
Simple and Efficient Password-Based Authenticated Key Exchange Protocol 被引量:1
4
作者 王立斌 潘嘉昕 马昌社 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期459-465,共7页
Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable n... Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable network with a secure session key.In this paper,we propose a simple,efficient and provably secure PAKE protocol based on Diffie-Hellman key exchange and cryptographic hash function.Our protocol is secure against dictionary attacks.Its security is proved based on the hardness of the computational Diffie-Hellman problem in the random oracle model. 展开更多
关键词 password authentication key exchange provable security
原文传递
AvoidPwd: A Mnemonic Password Generation Strategy Based on Keyboard Transformation 被引量:1
5
作者 Shunying Lyu Qian Yao Jianhua Song 《China Communications》 SCIE CSCD 2022年第10期92-101,共10页
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ... Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the primary method in the future due to their simplicity and low cost.Considering the security and usability of passwords,we propose AvoidPwd,which is a novel mnemonic password generation strategy that is based on keyboard transformation.AvoidPwd helps users customize a“route”to bypass an“obstacle”and choose the characters on the“route”as the final password.The“obstacle”is a certain word using any language and the keys adjacent to the“obstacle”are typed with the“Shift”key.A two-part experiment was conducted to examine the memorability and security of the AvoidPwd strategy with other three password strategies and three leaked password sets.The results showed that the passwords generated by the AvoidPwd strategy were more secure than the other leaked password sets.Meanwhile,AvoidPwd outperformed the KbCg,SpIns,and Alphapwd in balancing security and usability.In addition,there are more symbols in the character distribution of AvoidPwd than the other strategies.AvoidPwd is hopeful to solve the security problem that people are difficult to remember symbols and they tend to input letters and digits when creating passwords. 展开更多
关键词 password generation strategy password security mnemonic passwords
在线阅读 下载PDF
Implementation of a TPM-Based Security Enhanced Browser Password Manager 被引量:1
6
作者 HE Yuchen WANG Rui SHI Wenchang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期56-62,共7页
In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which... In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.Abstract: In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable. 展开更多
关键词 trusted platform module(TPM) password manager trusted encryption decryption
原文传递
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2
7
作者 Li Wenmin Wen Qiaoyan Su Qi Zhang Hua Jin Zhengping 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera... To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. 展开更多
关键词 mobile applications key exchange password elliptic curve cryptosystem SECURITY
在线阅读 下载PDF
Simple Three-Party Password Authenticated Key Exchange Protocol 被引量:1
8
作者 罗乃维 叶国晖 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期600-603,共4页
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on pas... Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. 展开更多
关键词 authentication CRYPTANALYSIS error correction code (ECC) simple three-party password authenticated key exchange (S-3PAKE) security undetectable on-line dictionary attack
原文传递
CM-Droid: Secure Container for Android Password Misuse Vulnerability 被引量:1
9
作者 Wen Zhang Keyue Li +2 位作者 Tianyang Li Shaozhang Niu Zhenguang Gao 《Computers, Materials & Continua》 SCIE EI 2019年第4期181-198,共18页
Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However... Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However,application developers do not have the knowledge of cryptography,thus the cryptographic algorithm may not be used correctly.As a result,security vulnerabilities are generated.Based on the previous studies,this paper summarizes the characteristics of password misuse vulnerability of Android application software,establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability.And on this basis,this paper designs and implements a secure container for Android application software password misuse vulnerability:CM-Droid. 展开更多
关键词 password misuse evaluation model secure container dynamic repair
在线阅读 下载PDF
A Password-Based Secure Communication Scheme in Battlefields for Internet of Things 被引量:1
10
作者 张华 高飞 +1 位作者 温巧燕 金正平 《China Communications》 SCIE CSCD 2011年第1期72-78,共7页
Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et ... Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient. 展开更多
关键词 Internet of Things password BROADCAST UNICAST direct communication across realms
在线阅读 下载PDF
Norton Utilities8.0中Password的解除
11
作者 曲得双 彭卉 《黑龙江水利科技》 1996年第3期95-97,共3页
NortonUtilities8.0中Password的解除曲得双,彭卉(黑龙江省水利水电勘测设计研究院)[关键词]Password,偏异量,异或运算,解除NortonUtilities是由Norton公司推出的功能... NortonUtilities8.0中Password的解除曲得双,彭卉(黑龙江省水利水电勘测设计研究院)[关键词]Password,偏异量,异或运算,解除NortonUtilities是由Norton公司推出的功能强大的实用工具组。它能够进行数据恢... 展开更多
关键词 password 偏异量 异或运算 解除
在线阅读 下载PDF
基于RESTful以及Salted Password Hashing算法的模拟试衣间系统 被引量:1
12
作者 夏禹 《现代信息科技》 2019年第11期196-198,共3页
本文主要从系统设计、功能实现、整体架构的角度介绍了基于B/S模式下的模拟试衣间系统。本文还着重地介绍了Salted Password Hashing加密算法与传统的哈希函数加密算法之间存在的区别与联系,Salted Password Hashing加密算法在传统的软... 本文主要从系统设计、功能实现、整体架构的角度介绍了基于B/S模式下的模拟试衣间系统。本文还着重地介绍了Salted Password Hashing加密算法与传统的哈希函数加密算法之间存在的区别与联系,Salted Password Hashing加密算法在传统的软件系统中能够发挥重要作用,以及RESTful架构下软件系统的使用设计、实现方案及REST设计规范为实际软件编程带来的便利。 展开更多
关键词 模拟试衣间系统 RESTFUL 前后端分离 Salted password HASHING
在线阅读 下载PDF
Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation
13
作者 谢琪 刘文浩 +3 位作者 王圣宝 胡斌 董娜 于秀源 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期418-424,共7页
User authentication scheme allows user and server to authenticate each other, and generates a session key for the subsequent communication. How to resist the password guessing attacks and smart card stolen attacks are... User authentication scheme allows user and server to authenticate each other, and generates a session key for the subsequent communication. How to resist the password guessing attacks and smart card stolen attacks are two key problems for designing smart cart and password based user authentication scheme. In 2011, Li and Lee proposed a new smart cart and password based user authentication scheme with smart card revocation, and claimed that their scheme could be immunity to these attacks. In this paper, we show that Li and Lee's scheme is vulnerable to off-line password guessing attack once the information stored in smart card is extracted, and it does not provide perfect forward secrecy. A robust user authentication scheme with smart card revocation is then proposed. We use a most popular and widely used formal verification tool ProVerif, which is based on applied pi calculus, to prove that the proposed scheme achieves security and authentication. 展开更多
关键词 user authentication smart card password PROTOCOL SECURITY
原文传递
Analysis and Improvement of Cross-Realm Client-to-Client Password Authenticated Key Exchange Protocols
14
作者 DING Xiaofei MA Chuangui CHENG Qingfeng 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期572-576,共5页
Because cross-realm C2C-PAKE (client-to-client password authenticated key exchange) protocols can not resist some attacks, this paper writes up new attacks on two representative protocols, then designs a new cross-r... Because cross-realm C2C-PAKE (client-to-client password authenticated key exchange) protocols can not resist some attacks, this paper writes up new attacks on two representative protocols, then designs a new cross-realm C2C-PAKE protocol with signature and optimal number of rounds for a client (only 2-rounds between a client and a server). Finally, it is proved that the new protocol can be resistant to all known attacks through heuristic analysis and that it brings more security through the comparisons of security properties with other protocols. 展开更多
关键词 password client-to-client authenticated key exchange SIGNATURE cross-realm
在线阅读 下载PDF
Off-Line Dictionary Attack on Password-Based Authenticated Key Exchange Protocols
15
作者 XU Chungen YANG Yanjiong 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期468-472,共5页
In 2010,Lee et al proposed two simple and efficient three-party password-authenticated key exchange protocols that had been proven secure in the random oracle model.They argued that the two protocols could resist offl... In 2010,Lee et al proposed two simple and efficient three-party password-authenticated key exchange protocols that had been proven secure in the random oracle model.They argued that the two protocols could resist offline dictionary attacks.Indeed,the provable approach did not provide protection against off-line dictionary attacks.This paper shows that the two protocols are vulnerable to off-line dictionary attacks in the presence of an inside attacker because of an authentication flaw.This study conducts a detailed analysis on the flaw in the protocols and also shows how to eliminate the security flaw. 展开更多
关键词 key exchange password OFF-LINE dictionary attack provable security
原文传递
Practical Encrypted Key Agreement Using Passwords
16
作者 WU Shuhua ZHU Yuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1625-1628,共4页
We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does no... We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does not need to carry smart card storing his private information but just needs to know his identity and password. For this purpose, the scheme was implemented over elliptic curves because of their well-known advantages with regard to processing and size constraints. Furthermore, the scheme is provably secure under the assumptions that the hash function closely behaves like a random oracle and that the elliptic curve computational Diffie-Hellman problem is difficult. 展开更多
关键词 password encrypted key exchange Diffie-Hellman assumptions
在线阅读 下载PDF
AN IMPROVED REMOTE PASSWORD AUTHENTICATION SCHEME WITH SMART CARD
17
作者 Jing Chao 《Journal of Electronics(China)》 2012年第6期550-555,共6页
This paper analyzes the security performance of a latest proposed remote two-factor user authentication scheme and proposes an improved scheme based on the dynamic ID to avoid the attacks it suffers. Besides this, in ... This paper analyzes the security performance of a latest proposed remote two-factor user authentication scheme and proposes an improved scheme based on the dynamic ID to avoid the attacks it suffers. Besides this, in our proposed scheme the password is no longer involved in the calculation of verification phase which makes our scheme more secure and costs less than the old one. At last we analyze the performance of our proposed scheme to prove it provides mutual authentication between the user and the server. Moreover, it also resists password guessing attack, server and user masquerade attack and replay attack effectively. 展开更多
关键词 Two-factor password authentication Smart card Dynamic ID
在线阅读 下载PDF
A New Secure Password Authentication Scheme Using Smart Cards
18
作者 WANG Bangju WANG Yuhua ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期739-743,共5页
Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed.The new scheme can ... Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed.The new scheme can satisfy all the listed ideal security requirements and has the following merits:(1)it can resist all the attacks listed in introduction;(2)less storage memory requirement due to no verification table stored in server;(3)low computational cost due to hash functions based operations;(4)even if the smart card is lost,the new system is still secure;(5)As user identity is anonymous,this scheme is more practical.The new proposed scheme can be applied in source constraint networks. 展开更多
关键词 password password authentication hash function ATTACK smart card
原文传递
一种利用显示卡跳过PASSWORD检测的方法 被引量:1
19
作者 张晓红 《现代计算机》 1999年第2期76-76,共1页
关键词 计算机机房 显示卡 password 检测
在线阅读 下载PDF
巧用Passware Password Recovery Kit破解密码
20
作者 顾娟 《电脑知识与技术(经验技巧)》 2018年第9期26-27,共2页
Passware Password RecoveryKit是国外一款优秀的密码恢复软件,具有强大的文件保护密码破解能力,几乎可以破解当今所有文件的密码。在网上下载“Passware Password Recovery Kit”汉化绿色版后,安装并运行“Passware Password Recove... Passware Password RecoveryKit是国外一款优秀的密码恢复软件,具有强大的文件保护密码破解能力,几乎可以破解当今所有文件的密码。在网上下载“Passware Password Recovery Kit”汉化绿色版后,安装并运行“Passware Password Recovery Kit”即可使用(图1)。下面一起体验下它的常用功能吧。 展开更多
关键词 password RECOVERY 密码破解 KIT 巧用 文件保护 恢复软件 网上下载
在线阅读 下载PDF
上一页 1 2 93 下一页 到第
使用帮助 返回顶部