Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from...
Saved in:
| Main Author | |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Netherlands
Springer Nature
2015
Springer International Publishing AG Springer |
| Edition | 1 |
| Series | LNCS sublibrary. SL 4, Security and cryptology |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3319241923 9783319241920 3319241915 9783319241913 |
Cover
| Abstract | This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions. The papers are organized in topical sections on hash functions, usability, analyses and new techniques. |
|---|---|
| AbstractList | This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions. The papers are organized in topical sections on hash functions, usability, analyses and new techniques. |
| Author | Mjølsnes, Stig F |
| Author_xml | – sequence: 1 fullname: Mjolsnes, Stig F |
| BookMark | eNpNz9tKw0AQBuAVD2hr3yGIIF4E9rybSw31AAV7UbwNm82kiY27NRNbfHuDFfFiGAY-_uGfkJMQAxyRiRAs43Iccfz_OCMTRrVm1kpjz8kM8Y1SypRVKrMX5HoFvgmxi-uvxIUqWfbOD62HJNbJ0iHuY1_hJTmtXYcw-91T8vowX-VP6eLl8Tm_W6SOj59sKmvmNatKbhitOdAMjANaZqJSToH1hpeikt4LsJJrVWpZGSNqzQVQCqwUU3J7CHa4gT02sRuw2HVQxrjBIjP2rxcd7c3Bbvv48Qk4FD_MQxh61xXz-3xsSDOpR3l1kN6h69rQFu8xxHXvtg0WSjLDuRDf2eBbkg |
| ContentType | eBook |
| DBID | I4C |
| DEWEY | 005 |
| DatabaseName | Casalini Torrossa eBooks Institutional Catalogue |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 3319241923 9783319241920 |
| Edition | 1 1st ed. 2015 |
| Editor | Mjølsnes, Stig F |
| Editor_xml | – sequence: 1 fullname: Mjølsnes, Stig F |
| ExternalDocumentID | 9783319241920 EBC5590946 5417223 |
| GroupedDBID | 0D6 0DA 38. AABBV AAGZE AAZAK AAZUS ABBVZ ABFTD ABMNI ACKNT ACRRC AEDXK AEKFX AETDV AEZAY ALMA_UNASSIGNED_HOLDINGS APFYR AZZ BBABE CZZ I4C IEZ IY- LDH NUC SAO SBO SFQCF TMQGW TPJZQ TSXQS TWXRB Z7R Z7S Z7U Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z87 Z88 AEJLV Z85 |
| ID | FETCH-LOGICAL-a29238-4f1c61db2710f2e09e7ae0b93d5a5e8c72b3d4cc3e84265b64d773f623e00e1b3 |
| ISBN | 3319241923 9783319241920 3319241915 9783319241913 |
| IngestDate | Fri Nov 08 04:08:02 EST 2024 Mon May 05 07:12:49 EDT 2025 Tue Nov 14 22:52:44 EST 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum_Ident | Q |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a29238-4f1c61db2710f2e09e7ae0b93d5a5e8c72b3d4cc3e84265b64d773f623e00e1b3 |
| OCLC | 1066188478 |
| PQID | EBC5590946 |
| PageCount | 159 |
| ParticipantIDs | askewsholts_vlebooks_9783319241920 proquest_ebookcentral_EBC5590946 casalini_monographs_5417223 |
| PublicationCentury | 2000 |
| PublicationDate | 2015 2015-10-27 |
| PublicationDateYYYYMMDD | 2015-01-01 2015-10-27 |
| PublicationDate_xml | – year: 2015 text: 2015 |
| PublicationDecade | 2010 |
| PublicationPlace | Netherlands |
| PublicationPlace_xml | – name: Netherlands – name: Cham |
| PublicationSeriesTitle | LNCS sublibrary. SL 4, Security and cryptology |
| PublicationYear | 2015 |
| Publisher | Springer Nature Springer International Publishing AG Springer |
| Publisher_xml | – name: Springer Nature – name: Springer International Publishing AG – name: Springer |
| SSID | ssj0001585598 |
| Score | 1.9591477 |
| Snippet | This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim,... |
| SourceID | askewsholts proquest casalini |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Computer programming, programs, data Computers Computers-Access control-Passwords-Congresses |
| Subtitle | International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers |
| TableOfContents | 5 Related Work -- 6 Conclusions -- References -- charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication -- 1 Introduction -- 2 Related Work -- 3 The Proposed System -- 3.1 Design Features -- 3.2 Implementation -- 4 User Study -- 4.1 Sessions of the Study -- 4.2 Pre-experimental Instructions -- 4.3 Lab Study -- 4.4 Web Study -- 5 Results -- 5.1 Collected Data Analysis -- 6 Discussion -- 7 Conclusion -- References -- Analyses -- Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords -- 1 Introduction -- 1.1 Recent Data Breaches Relating to Passwords -- 1.2 Earlier Results on Passwords -- 2 Encrypting Cleartext Passwords -- 2.1 Password Strength -- 2.2 Password Length Distribution -- 2.3 Letter Frequency Distribution -- 2.4 Entropy Distribution -- 2.5 The Most Common Passwords -- 3 Conclusion and Future Work -- References -- Gathering and Analyzing Identity Leaks for Security Awareness -- 1 Introduction -- 2 Related Work -- 2.1 Scientific Publications -- 2.2 Products and Services -- 3 Identity Leak Checker Service -- 4 Gathering of Identity Leaks -- 4.1 Leak Provision -- 4.2 Leak Announcement -- 4.3 Automated Gathering of Identity Leaks -- 5 Anatomy of an Identity Leak -- 5.1 Information in Identity Leaks and Data Model -- 5.2 Types of Identity Leaks -- 6 Evaluation -- 6.1 Password Distribution -- 6.2 Password Encryption/Hashing Methods -- 7 Future Work -- 8 Conclusion -- References -- New Techniques -- PassCue: The Shared Cues System in Practice -- 1 Introduction -- 2 Background -- 2.1 Password Management Schemes -- 2.2 Person-Action-Object -- 2.3 Password Composition Policy -- 3 BBD Model and the Shared Cues Scheme -- 3.1 Usability Model -- 3.2 Security Model -- 4 Design -- 4.1 Public Cues -- 4.2 Sharing Set -- 4.3 Rehearsal Schedule -- 4.4 Password Composition -- 4.5 Association Set Intro -- Preface -- Organization -- Contents -- Hash Functions -- Overview of the Candidates for the Password Hashing Competition -- 1 Introduction -- 2 (Weak) Garbage-Collector Attacks and Their Application to ROMix and scrypt -- 2.1 The (Weak) Garbage-Collector Attack -- 2.2 (Weak) Garbage-Collector Attacks on scrypt -- 3 Overview -- 4 Resistance of PHC Candidates Against (W)GC Attacks -- 5 Conclusion -- References -- On Password Guessing with GPUs and FPGAs -- 1 Introduction -- 1.1 Related Work -- 1.2 Outline -- 2 The Scrypt Password Hash -- 2.1 The Scrypt Construction -- 2.2 GPU Programming -- 2.3 Implementing Scrypt on CUDA -- 3 The Bcrypt Password Hash -- 3.1 The Bcrypt Construction -- 3.2 Implementations of Bcrypt on FPGAs -- 4 Methodology -- 4.1 Basic Idea -- 4.2 Derivation of Equivalent Parameters -- 4.3 Comparing Different Platforms -- 5 Results -- 5.1 Comparing with oclHashcat -- 5.2 Measuring Hashrates -- 5.3 Comparison Taking Cost into Account -- 6 Conclusion -- A Full Runtime Listings for Hashcat -- B Full Runtime Listings for the Benchmark CPUs -- C Full Runtime Listings for Different Trade-Off Parameters for Scrypt -- References -- Cryptographic Module Based Approach for Password Hashing Schemes -- 1 Introduction -- 2 Cryptographic Module -- 3 General Approach for Cryptographic Module Based Password Hashing Scheme -- 4 Security Analysis -- 5 Analysis of Submitted PHC Designs with Respect to Cryptographic Module Based Approach -- 5.1 Categorization of the Schemes -- 6 Conclusions -- References -- Usability -- Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers -- 1 Introduction -- 2 Inconsistencies in Password-Based Login on the Web -- 3 Incentives -- 4 The PMF Semantic Markup -- 4.1 Overview -- 4.2 Forms -- 4.3 Inputs -- 4.4 Password Composition Policies -- 4.5 Errors 4.6 Specification -- 5 Analysis -- 5.1 Usability -- 5.2 Security -- 6 Conclusion -- A PassCue -- References -- Private Password Auditing -- 1 Introduction -- 2 Password Auditing -- 2.1 Naive Approach -- 2.2 Auditing Without Full Hashes -- 3 Private Password Auditing (PPA) -- 3.1 Settings -- 3.2 PPA Based on Private Set Intersection -- 3.3 PPA Based on Private Set Intersection Cardinality -- 4 Practicality of PPA Tool -- 5 Conclusion -- References -- SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper) -- 1 Introduction -- 2 The Problem: Mafia Fraud Relay Attacks -- 3 Our Solution: The SAVVIcode -- 4 Challenges and Future Work -- 5 Conclusions -- References -- Author Index |
| Title | Technology and Practice of Passwords |
| URI | http://digital.casalini.it/9783319241920 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5590946 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319241920 |
| Volume | 9393 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1Jb9QwFIAt2l7ohV1MC8hCIA6TICe2syBxgNGgqhpGSCmlt8hxHJZWyWgSqOCn8Gt5XpLMFA7AJcpYnkTy59jvPb8FoSdCBCImFfVlSLnPYAvzBS2YD_otiUsqZSJMts9ldPSeHZ_xs76avYsu6Yrn8scf40r-hyq0AVcdJfsPZIeHQgPcA1-4AmG4XhF-h58O7mAQd4H-NtTJuC-DNHwJGqVxddu2943RffqI4N3Q0djisuwD6IPZ0zAOmIG4buryk7LFlpfN-lLY83Ylla4hMtXpWnUDbO2mv3YXbkF6bU1hHbhZiZUaj4refmkuWlcWIOs-f3QexXqYVPtysZxl01ZbxKwJdJotpuapmSuvZ8Pv1t9X3XgM4GwVgclxakP_t2yVWzospVoHBLWRbi7KKbWFE68kw97oH5IdtBPHsKrtvZofL05HyxpoQDxNdCBP_2huUy2Nr9pH-6I9h20Etpiu1TKJaIUORf1tSzZyxslNtKd08MktdE3Vt9GNvuQGdivwHfRzJI9hSHBPHjcVHsi_wFvc8cgdNzUeuHt4oP4sYB4eiHvY8vZwTxtr2h7WrD3sSOOeNLak76LTN_OT2ZHvymv4IgSxPvFZFcgoKAuYWKQKFUlVLBQpUlpywVUi47CgJZOSqgTkOF5ErIxjWoHArAhRQUHvod26qdV9hEHtpmXBeVRRxaiIRBXJVKWhAH25LBmZoMcb451_uzCuAG2-xXOCDnsMOXypNmV7m3MGQnZIJwj3ZHLzb-e9nM9fz4A3SVl08DdvOUTXx6n5AO1266_qIQiWXfHIzaRfohJ3lw |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Technology+and+practice+of+passwords%3A+International+Conference+on+Passwords%2C+PASSWORDS%2714%2C+Trondheim%2C+Norway%2C+December+8-10%2C+2014%2C+revised+selected+papers&rft.au=Mjolsnes%2C+Stig+F&rft.series=LNCS+sublibrary.+SL+4%2C+Security+and+cryptology&rft.date=2015-10-27&rft.pub=Springer&rft.isbn=9783319241913&rft.volume=9393&rft.externalDocID=9783319241920 |
| thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833192%2F9783319241920.jpg |