![]() ![]() ![]() In: Proceedings of the 6th Symposium on Usable Privacy and Security, p. 16.Shay, R., et al.: Encountering stronger password requirements: user attitudes and behaviors.Technical report, SRI International (1998) Google Scholar 15.Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression.14.Pinkas, B., Schneider, T., Zohner, M.: Faster private set intersection based on OT extension.In Proceedings of the 8th European Workshop on System Security, p. 13.Petsas, T., Tsirantonakis, G., Athanasopoulos, E., Ioannidis, S.: Two-factor authentication: is the world ready?: quantifying 2FA adoption.Oechslin P Boneh D Making a faster cryptanalytic time-memory trade-off Advances in Cryptology - CRYPTO 2003 2003 Heidelberg Springer 617 630 10.1007/978-6-4_36 Google Scholar Cross Ref 11.Matatall, N.: New improvements and best practices for account security and recoverability (2018).In: Proceedings of ACM CCS (2019) Google Scholar 10.Li, L., Pal, B., Ali, J., Sullivan, N., Chatterjee, R., Ristenpart, T.: Protocols for checking compromised credentials.Kolesnikov V Rosulek M Trieu N Wang X Galbraith SD Moriai S Scalable private set union from symmetric-key techniques Advances in Cryptology – ASIACRYPT 2019 2019 Cham Springer 636 666 10.1007/978-1-8_23 Google Scholar Kelsey J Schneier B Hall C Wagner D Okamoto E Davida G Mambo M Secure applications of low-entropy keys Information Security 1998 Heidelberg Springer 121 134 10.1007/BFb0030415 Google Scholar 7.Hunt, T.: Have i been pwned is now partnering with 1password (2018).5.Habib, H., et al.: Password creation in the presence of blacklists.Galletta DF Henry R McCoy S Polak P Web site delays: how tolerant are users? J. Freedman MJ Ishai Y Pinkas B Reingold O Kilian J Keyword search and oblivious pseudorandom functions Theory of Cryptography 2005 Heidelberg Springer 303 324 10.1007/978-6-7_17 Google Scholar Digital Library Ciampi M Orlandi C Catalano D De Prisco R Combining private set-intersection with secure two-party computation Security and Cryptography for Networks 2018 Cham Springer 464 482 10.1007/978-3-0_25 Google Scholar 1.Ali, J.: Validating leaked passwords with k-anonymity, February 2018. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |