Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from...

Full description

Saved in:
Bibliographic Details
Main Author Mjolsnes, Stig F
Format eBook
LanguageEnglish
Published Netherlands Springer Nature 2015
Springer International Publishing AG
Springer
Edition1
SeriesLNCS sublibrary. SL 4, Security and cryptology
Subjects
Online AccessGet full text
ISBN3319241923
9783319241920
3319241915
9783319241913

Cover

Abstract This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions. The papers are organized in topical sections on hash functions, usability, analyses and new techniques.
AbstractList This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions. The papers are organized in topical sections on hash functions, usability, analyses and new techniques.
Author Mjølsnes, Stig F
Author_xml – sequence: 1
  fullname: Mjolsnes, Stig F
BookMark eNpNz9tKw0AQBuAVD2hr3yGIIF4E9rybSw31AAV7UbwNm82kiY27NRNbfHuDFfFiGAY-_uGfkJMQAxyRiRAs43Iccfz_OCMTRrVm1kpjz8kM8Y1SypRVKrMX5HoFvgmxi-uvxIUqWfbOD62HJNbJ0iHuY1_hJTmtXYcw-91T8vowX-VP6eLl8Tm_W6SOj59sKmvmNatKbhitOdAMjANaZqJSToH1hpeikt4LsJJrVWpZGSNqzQVQCqwUU3J7CHa4gT02sRuw2HVQxrjBIjP2rxcd7c3Bbvv48Qk4FD_MQxh61xXz-3xsSDOpR3l1kN6h69rQFu8xxHXvtg0WSjLDuRDf2eBbkg
ContentType eBook
DBID I4C
DEWEY 005
DatabaseName Casalini Torrossa eBooks Institutional Catalogue
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 3319241923
9783319241920
Edition 1
1st ed. 2015
Editor Mjølsnes, Stig F
Editor_xml – sequence: 1
  fullname: Mjølsnes, Stig F
ExternalDocumentID 9783319241920
EBC5590946
5417223
GroupedDBID 0D6
0DA
38.
AABBV
AAGZE
AAZAK
AAZUS
ABBVZ
ABFTD
ABMNI
ACKNT
ACRRC
AEDXK
AEKFX
AETDV
AEZAY
ALMA_UNASSIGNED_HOLDINGS
APFYR
AZZ
BBABE
CZZ
I4C
IEZ
IY-
LDH
NUC
SAO
SBO
SFQCF
TMQGW
TPJZQ
TSXQS
TWXRB
Z7R
Z7S
Z7U
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z87
Z88
AEJLV
Z85
ID FETCH-LOGICAL-a29238-4f1c61db2710f2e09e7ae0b93d5a5e8c72b3d4cc3e84265b64d773f623e00e1b3
ISBN 3319241923
9783319241920
3319241915
9783319241913
IngestDate Fri Nov 08 04:08:02 EST 2024
Mon May 05 07:12:49 EDT 2025
Tue Nov 14 22:52:44 EST 2023
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident Q
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a29238-4f1c61db2710f2e09e7ae0b93d5a5e8c72b3d4cc3e84265b64d773f623e00e1b3
OCLC 1066188478
PQID EBC5590946
PageCount 159
ParticipantIDs askewsholts_vlebooks_9783319241920
proquest_ebookcentral_EBC5590946
casalini_monographs_5417223
PublicationCentury 2000
PublicationDate 2015
2015-10-27
PublicationDateYYYYMMDD 2015-01-01
2015-10-27
PublicationDate_xml – year: 2015
  text: 2015
PublicationDecade 2010
PublicationPlace Netherlands
PublicationPlace_xml – name: Netherlands
– name: Cham
PublicationSeriesTitle LNCS sublibrary. SL 4, Security and cryptology
PublicationYear 2015
Publisher Springer Nature
Springer International Publishing AG
Springer
Publisher_xml – name: Springer Nature
– name: Springer International Publishing AG
– name: Springer
SSID ssj0001585598
Score 1.9591477
Snippet This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim,...
SourceID askewsholts
proquest
casalini
SourceType Aggregation Database
Publisher
SubjectTerms Computer programming, programs, data
Computers
Computers-Access control-Passwords-Congresses
Subtitle International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers
TableOfContents 5 Related Work -- 6 Conclusions -- References -- charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication -- 1 Introduction -- 2 Related Work -- 3 The Proposed System -- 3.1 Design Features -- 3.2 Implementation -- 4 User Study -- 4.1 Sessions of the Study -- 4.2 Pre-experimental Instructions -- 4.3 Lab Study -- 4.4 Web Study -- 5 Results -- 5.1 Collected Data Analysis -- 6 Discussion -- 7 Conclusion -- References -- Analyses -- Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords -- 1 Introduction -- 1.1 Recent Data Breaches Relating to Passwords -- 1.2 Earlier Results on Passwords -- 2 Encrypting Cleartext Passwords -- 2.1 Password Strength -- 2.2 Password Length Distribution -- 2.3 Letter Frequency Distribution -- 2.4 Entropy Distribution -- 2.5 The Most Common Passwords -- 3 Conclusion and Future Work -- References -- Gathering and Analyzing Identity Leaks for Security Awareness -- 1 Introduction -- 2 Related Work -- 2.1 Scientific Publications -- 2.2 Products and Services -- 3 Identity Leak Checker Service -- 4 Gathering of Identity Leaks -- 4.1 Leak Provision -- 4.2 Leak Announcement -- 4.3 Automated Gathering of Identity Leaks -- 5 Anatomy of an Identity Leak -- 5.1 Information in Identity Leaks and Data Model -- 5.2 Types of Identity Leaks -- 6 Evaluation -- 6.1 Password Distribution -- 6.2 Password Encryption/Hashing Methods -- 7 Future Work -- 8 Conclusion -- References -- New Techniques -- PassCue: The Shared Cues System in Practice -- 1 Introduction -- 2 Background -- 2.1 Password Management Schemes -- 2.2 Person-Action-Object -- 2.3 Password Composition Policy -- 3 BBD Model and the Shared Cues Scheme -- 3.1 Usability Model -- 3.2 Security Model -- 4 Design -- 4.1 Public Cues -- 4.2 Sharing Set -- 4.3 Rehearsal Schedule -- 4.4 Password Composition -- 4.5 Association Set
Intro -- Preface -- Organization -- Contents -- Hash Functions -- Overview of the Candidates for the Password Hashing Competition -- 1 Introduction -- 2 (Weak) Garbage-Collector Attacks and Their Application to ROMix and scrypt -- 2.1 The (Weak) Garbage-Collector Attack -- 2.2 (Weak) Garbage-Collector Attacks on scrypt -- 3 Overview -- 4 Resistance of PHC Candidates Against (W)GC Attacks -- 5 Conclusion -- References -- On Password Guessing with GPUs and FPGAs -- 1 Introduction -- 1.1 Related Work -- 1.2 Outline -- 2 The Scrypt Password Hash -- 2.1 The Scrypt Construction -- 2.2 GPU Programming -- 2.3 Implementing Scrypt on CUDA -- 3 The Bcrypt Password Hash -- 3.1 The Bcrypt Construction -- 3.2 Implementations of Bcrypt on FPGAs -- 4 Methodology -- 4.1 Basic Idea -- 4.2 Derivation of Equivalent Parameters -- 4.3 Comparing Different Platforms -- 5 Results -- 5.1 Comparing with oclHashcat -- 5.2 Measuring Hashrates -- 5.3 Comparison Taking Cost into Account -- 6 Conclusion -- A Full Runtime Listings for Hashcat -- B Full Runtime Listings for the Benchmark CPUs -- C Full Runtime Listings for Different Trade-Off Parameters for Scrypt -- References -- Cryptographic Module Based Approach for Password Hashing Schemes -- 1 Introduction -- 2 Cryptographic Module -- 3 General Approach for Cryptographic Module Based Password Hashing Scheme -- 4 Security Analysis -- 5 Analysis of Submitted PHC Designs with Respect to Cryptographic Module Based Approach -- 5.1 Categorization of the Schemes -- 6 Conclusions -- References -- Usability -- Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers -- 1 Introduction -- 2 Inconsistencies in Password-Based Login on the Web -- 3 Incentives -- 4 The PMF Semantic Markup -- 4.1 Overview -- 4.2 Forms -- 4.3 Inputs -- 4.4 Password Composition Policies -- 4.5 Errors
4.6 Specification -- 5 Analysis -- 5.1 Usability -- 5.2 Security -- 6 Conclusion -- A PassCue -- References -- Private Password Auditing -- 1 Introduction -- 2 Password Auditing -- 2.1 Naive Approach -- 2.2 Auditing Without Full Hashes -- 3 Private Password Auditing (PPA) -- 3.1 Settings -- 3.2 PPA Based on Private Set Intersection -- 3.3 PPA Based on Private Set Intersection Cardinality -- 4 Practicality of PPA Tool -- 5 Conclusion -- References -- SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper) -- 1 Introduction -- 2 The Problem: Mafia Fraud Relay Attacks -- 3 Our Solution: The SAVVIcode -- 4 Challenges and Future Work -- 5 Conclusions -- References -- Author Index
Title Technology and Practice of Passwords
URI http://digital.casalini.it/9783319241920
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5590946
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319241920
Volume 9393
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1Jb9QwFIAt2l7ohV1MC8hCIA6TICe2syBxgNGgqhpGSCmlt8hxHJZWyWgSqOCn8Gt5XpLMFA7AJcpYnkTy59jvPb8FoSdCBCImFfVlSLnPYAvzBS2YD_otiUsqZSJMts9ldPSeHZ_xs76avYsu6Yrn8scf40r-hyq0AVcdJfsPZIeHQgPcA1-4AmG4XhF-h58O7mAQd4H-NtTJuC-DNHwJGqVxddu2943RffqI4N3Q0djisuwD6IPZ0zAOmIG4buryk7LFlpfN-lLY83Ylla4hMtXpWnUDbO2mv3YXbkF6bU1hHbhZiZUaj4refmkuWlcWIOs-f3QexXqYVPtysZxl01ZbxKwJdJotpuapmSuvZ8Pv1t9X3XgM4GwVgclxakP_t2yVWzospVoHBLWRbi7KKbWFE68kw97oH5IdtBPHsKrtvZofL05HyxpoQDxNdCBP_2huUy2Nr9pH-6I9h20Etpiu1TKJaIUORf1tSzZyxslNtKd08MktdE3Vt9GNvuQGdivwHfRzJI9hSHBPHjcVHsi_wFvc8cgdNzUeuHt4oP4sYB4eiHvY8vZwTxtr2h7WrD3sSOOeNLak76LTN_OT2ZHvymv4IgSxPvFZFcgoKAuYWKQKFUlVLBQpUlpywVUi47CgJZOSqgTkOF5ErIxjWoHArAhRQUHvod26qdV9hEHtpmXBeVRRxaiIRBXJVKWhAH25LBmZoMcb451_uzCuAG2-xXOCDnsMOXypNmV7m3MGQnZIJwj3ZHLzb-e9nM9fz4A3SVl08DdvOUTXx6n5AO1266_qIQiWXfHIzaRfohJ3lw
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Technology+and+practice+of+passwords%3A+International+Conference+on+Passwords%2C+PASSWORDS%2714%2C+Trondheim%2C+Norway%2C+December+8-10%2C+2014%2C+revised+selected+papers&rft.au=Mjolsnes%2C+Stig+F&rft.series=LNCS+sublibrary.+SL+4%2C+Security+and+cryptology&rft.date=2015-10-27&rft.pub=Springer&rft.isbn=9783319241913&rft.volume=9393&rft.externalDocID=9783319241920
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833192%2F9783319241920.jpg