[1] |
TechWeb.com.cn.Under Armour旗下健身追踪应用遭攻击:1.5亿用户数据被泄露 (2018) [EB/OL].[2018-03-30]. http:∥www.techweb.com.cn/world/2018-03-30/2650816.shtml.
|
[2] |
KEITH M, SHAO B, STEINBART P. The Usability of Passphrases for Authentication:An Empirical Field Study[J]. International Journal of Human-Computer Studies, 2007, 65(1):17-28.
doi: 10.1016/j.ijhcs.2006.08.005
|
[3] |
BONNEAU J. The Science of Guessing:Analyzing an Anonymized Corpus of 70 Million Passwords[C]∥2012 IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2012:538-552.
|
[4] |
KLEIN D V. Foiling the Cracker:A Survey of,and Improvements to,Password Security[C]∥1990 USENIX Security Workshop.Berkeley:USENIX, 1990:5-14.
|
[5] |
DAS A, BONNEAU J, CAESAR M, et al. The Tangled Web of Password Reuse (2014) [C/OL]. [2014-02-22]. https:∥www.ndss-symposium.org/wp-content/uploads/2017/09/06_1_1.pdf.
|
[6] |
刘迎风, 刘胜利. 基于口令的密钥提取[J]. 西安电子科技大学学报, 2021, 48(1):61-68.
|
|
LIU Yingfeng, LIU Shengli. Key Distillation from Passwords[J]. Journal of Xidian University, 2021, 48(1):61-68.
|
[7] |
MA J, YANG W, LUO M, et al. A Study of Probabilistic Password Models[C]∥2014 IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2014:538-552.
|
[8] |
WEIR M, AGGARWAL S, DE MEDEIROS B, et al. Password Cracking Using Probabilistic Context-Free Grammars[C]∥2009 30th IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2009:391-405.
|
[9] |
WANG D, WANG P, HE D, et al. Birthday,Name and Bifacial-Security:Understanding Passwords of Chinese Web Users[C]∥Proceedings of the 28th USENIX Conference on Security Symposium.New York:ACM, 2019:1537-1554.
|
[10] |
WU Y. Nearly 80 Percent of Internet Users Suffer Identity Leaks (2015) [EB/OL]. [2015-07-24]. http:∥www.chinadaily.com.cn/china/2015-07/24/content_21400381.htm.
|
[11] |
SHAY R, KOMANDURI S, DURITY A L, et al. Designing Password Policies for Strength and Usability[J]. ACM Transactions on Information and System Security, 2016, 18(4):1-34.
|
[12] |
DELL’AMICO M, FILIPPONE M. Monte Carlo Strength Evaluation:Fast and Reliable Password Checking (2015) [C/OL]. [2015-10-16]. http:∥www.dcs.gla.ac.uk/~maurizio/Publications/ccs15.pdf.
|
[13] |
XIA Z, YI P, LIU Y, et al. GENPass:A Multi-Source Deep Learning Model for Password Guessing[J]. IEEE Transactions on Multimedia, 2020, 22(5):1323-1332.
doi: 10.1109/TMM.2019.2940877
|
[14] |
汪定, 邹云开, 陶义, 等. 基于循环神经网络和生成式对抗网络的口令猜测模型研究[J]. 计算机学报, 2021, 44(8):1519-1534.
|
|
WANG Ding, ZOU Yunkai, TAO Yi, et al. Password Guessing Based on Recursive Neural Networks and Generative Adversarial Networks[J]. Chinese Journal of Computers, 2021, 44(8):1519-1534.
|
[15] |
汪定. 口令安全关键问题研究[D]. 北京: 北京大学, 2017.
|
[16] |
韩锋. 基于定向猜测攻击的PSM系统研究与实现[D]. 北京: 北京邮电大学, 2020.
|
[17] |
LI Y, WANG H, SUN K. A Study of Personal Information in Human-Chosen Passwords and Its Security Implications[C]∥IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.Piscataway:IEEE, 2016:1-9.
|
[18] |
毕红军, 谭儒, 赵建军, 等. 基于主题PCFG的口令猜测模型研究[J]. 信息网络安全, 2019, 8:1-7.
|
|
BI Hongjun, TAN Ru, ZHAO Jianjun, et al. Research on Password Guessing Model Based on Theme PCFG[J]. Netinfo Security, 2019, 8:1-7.
|
[19] |
HITAJ B, GASTI P, ATENIESEG, et al. PassGAN:A Deep Learning Approach for Password Guessing[C]∥International Conference on Applied Cryptography and Network Security.Heidelberg:Springer, 2019:217-237.
|