A Study of Password Stealing Attacks and their Protection Mechanism
Abstract
Full Text:
PDFReferences
K. S. M. Moe and T. Win, "Improved hashing and honey-based stronger password prevention against brute force attack," in 2017 International Symposium on Electronics and Smart Devices (ISESD), 2017.
"Microsoft," 2006. [Online]. Available: at: http://www.microsoft.com/protect/yourself/password/create.mspx. [Accessed 26 October 2022].
T. Fandakly and C. Caporusso, "Strong passwords: How to create and use them," International Conference on Applied Human Factors and Ergonomics, pp. 48-58, 2019.
S. Furnell, "An assessment of website password practices," Computers & Security, vol. 26, pp. 445-451, 2007.
"Password cracking," [Online]. Available: https://en.wikipedia.org/wiki/Password_cracking. [Accessed 26 October 2022].
W. R. Cheswick, Firewalls And Internet Security: Repelling The Wily Hacker, 2/E, Pearson Education, 2003.
K. Brown, "The dangers of weak hashes," SANS Institute InfoSec Reading Room, Maryland US, pp. 1-22, 2013.
S. Bruce, Applied Cryptography: Protocols, Algorthms, and Source Code in C.-2nd, Schneier, 1996.
A.J. Menezes, P. C. Van Oorschot and S. A. Vanstone, Handbook of applied cryptography, CRC press, 2018.
A. Haldorai and A. Ramu, "Security and channel noise management in cognitive radio networks," Computers & Electrical Engineering, vol. 87, p. 106784.
Refbacks
- There are currently no refbacks.