Computer Science ›› 2020, Vol. 47 ›› Issue (4): 312-317.doi: 10.11896/jsjkx.190300104
• Information Security • Previous Articles Next Articles
CHEN Meng-dong, GUO Dong-sheng, XIE Xiang-hui, WU Dong
CLC Number:
[1]GUO X.The Scale-free Network of Passwords:Visualizationand Estimation of Empirical Passwords [EB/OL].[2019-03-18].http://arxiv.org/pdf/1511.08324v1. [2]WU Z Y,CHIANG D L,LIN T C,et al.A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network [C]// International Conference on Advanced Information Networking & Applications Workshops.IEEE,2012. [3]LIU J.Research and application of password cracking methodbased on special dictionary[D].Harbin:Harbin Institute of Technology,2015. [4]STEUBE J.hashcat advanved password recovery [EB/OL].[2019-03-18].https://hashcat.net/hashcat/. [5]Openwall.John the Ripper password cracker [EB/OL].[2019-03-18].http://www.openwall.com/john/doc/. [6]DAS A,BONNEAU J,CAESAR M,et al.The Tangled Web of Password Reuse[C]// Network and Distributed System Security Symposium.2014. [7]TATLI E I.Cracking More Password Hashes With Patterns[J].IEEE Transactions on Information Forensics & Security,2015,10(8):1656-1665. [8]NSAKEY.Password cracking rules and masks for hashcat that igenerated from cracked passwords[EB/OL].https://github:com/NSAKEY/nsa-rules. [9]GOODIN,D.Anatomy of a hack:How crackers ransack passwords like “qeadzcwrsfxv1331”[EB/OL].http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-yourpasswords/. [10]UR B,SEGRETI S M,BAUER L,et al.Measuring real-worldaccuracies and biases in modeling password guessability[C]// Usenix Conference on Security Symposium.2015. [11]VERAS R,THORPE J,COLLINS C.Visualizing semantics in passwords:The role of dates[C]// Proceedings of the Ninth International Symposium on Visualization for Cyber Security(VizSec ’12).New York,NY,USA:ACM,2012:88-95. [12]MELICHER W,UR B,SEGRETI S M,et al.Fast,lean,and accurate:Modeling password guessability using neural networks[C]//25th USENIX Security Symposium (USENIX Security 16).Austin,TX:USENIX Association,2016:175-191. [13]CHOU H C,LEE H C,YU H J,et al.Password cracking based on learned patterns from disclosed passwords[C]//IJICIC.2013. [14]FAHL S,HARBACH M,ACAR Y,et al.On the ecological validity of a password study[C]// Symposium on Usable Privacy and Security.2013:1-13. [15]DE CAMAVALET X C,MANNAN M.From very weak to very strong:Analyzing password—strength meters[C]//Proceedings of the Network and Distributed System Security Symposium.2014. [16]HUH J H,OH S,KIM H,et al.Surpass:System-initiated Userreplaceable Passwords[C]// The 22nd ACM SIGSAC Confe-rence on Computer and Communications Security.2015:170-181. [17]MILO F,BERNASCHI M,BISSON M.A fast,GPU based,dictionary attack to OpenPGP secret keyrings[J].Journal of Systems & Software,2011,84(12):2088-2096. [18]XU L,GE C,QIU W,et al.Password Guessing Based on LSTM Recurrent Neural Networks[C]// IEEE International Confe-rence on Computational Science and Engineering.IEEE,2017:785-788. [19]Xilinx.Zynq-7000 All Programmable SoC [EB/OL].[2019-03-18].https://www.xilinx.com/support/documentation/pro-duct-briefs/zynq-7000-product-brief.pdf. |
[1] | SONG Jie, LIANG Mei-yu, XUE Zhe, DU Jun-ping, KOU Fei-fei. Scientific Paper Heterogeneous Graph Node Representation Learning Method Based onUnsupervised Clustering Level [J]. Computer Science, 2022, 49(9): 64-69. |
[2] | HUANG Li, ZHU Yan, LI Chun-ping. Author’s Academic Behavior Prediction Based on Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(9): 76-82. |
[3] | LYU Xiao-feng, ZHAO Shu-liang, GAO Heng-da, WU Yong-liang, ZHANG Bao-qi. Short Texts Feautre Enrichment Method Based on Heterogeneous Information Network [J]. Computer Science, 2022, 49(9): 92-100. |
[4] | CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112. |
[5] | ZHANG Lu-ping, XU Fei. Survey on Spiking Neural P Systems with Rules on Synapses [J]. Computer Science, 2022, 49(8): 217-224. |
[6] | DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178. |
[7] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[8] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[9] | CHEN Xin, LI Fang, DING Hai-xin, SUN Wei-ze, LIU Xin, CHEN De-xun, YE Yue-jin, HE Xiang. Parallel Optimization Method of Unstructured-grid Computing in CFD for DomesticHeterogeneous Many-core Architecture [J]. Computer Science, 2022, 49(6): 99-107. |
[10] | ZHAO Luo-cheng, QU Zhi-hao, XIE Zai-peng. Study on Communication Optimization of Federated Learning in Multi-layer Wireless Edge Environment [J]. Computer Science, 2022, 49(3): 39-45. |
[11] | ZHANG Geng-qiang, XIE Jun, YANG Zhang-lin. Accelerating Forwarding Rules Issuance with Fast-Deployed-Segment-Routing(FDSR) in SD-MANET [J]. Computer Science, 2022, 49(2): 377-382. |
[12] | PU Shi, ZHAO Wei-dong. Community Detection Algorithm for Dynamic Academic Network [J]. Computer Science, 2022, 49(1): 89-94. |
[13] | JIANG Zong-li, FAN Ke, ZHANG Jin-li. Generative Adversarial Network and Meta-path Based Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(1): 133-139. |
[14] | ZHENG Su-su, GUAN Dong-hai, YUAN Wei-wei. Heterogeneous Information Network Embedding with Incomplete Multi-view Fusion [J]. Computer Science, 2021, 48(9): 68-76. |
[15] | YANG Lin, WANG Yong-jie, ZHANG Jun. FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor [J]. Computer Science, 2021, 48(8): 284-290. |
|