Home > Research > Publications & Outputs > A note on proactive password checking

Links

Text available via DOI:

View graph of relations

A note on proactive password checking

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

A note on proactive password checking. / Yan, Jeff.
New Security Paradigms Workshop: proceedings : September 10th-13th, 2001, Cloudcroft, NM, USA . New York: ACM, 2001. p. 127-135 (Proceedings of the 2001 New Security Paradigms Workshop).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Yan, J 2001, A note on proactive password checking. in New Security Paradigms Workshop: proceedings : September 10th-13th, 2001, Cloudcroft, NM, USA . Proceedings of the 2001 New Security Paradigms Workshop, ACM, New York, pp. 127-135. https://doi.org/10.1145/508171.508194

APA

Yan, J. (2001). A note on proactive password checking. In New Security Paradigms Workshop: proceedings : September 10th-13th, 2001, Cloudcroft, NM, USA (pp. 127-135). (Proceedings of the 2001 New Security Paradigms Workshop). ACM. https://doi.org/10.1145/508171.508194

Vancouver

Yan J. A note on proactive password checking. In New Security Paradigms Workshop: proceedings : September 10th-13th, 2001, Cloudcroft, NM, USA . New York: ACM. 2001. p. 127-135. (Proceedings of the 2001 New Security Paradigms Workshop). doi: 10.1145/508171.508194

Author

Yan, Jeff. / A note on proactive password checking. New Security Paradigms Workshop: proceedings : September 10th-13th, 2001, Cloudcroft, NM, USA . New York : ACM, 2001. pp. 127-135 (Proceedings of the 2001 New Security Paradigms Workshop).

Bibtex

@inproceedings{1018ebc8a1e24c5a9d7c14af226888fe,
title = "A note on proactive password checking",
abstract = "Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In this paper, a new approach is proposed to deal with this new class of weak passwords by (roughly) measuring entropy. A simple example is given to exploit effective patterns to prevent low-entropy passwords as the first step of entropy-based proactiv¢ password checking.",
keywords = "13, Proactive password checking~ dictionary attack, dictionary attack, done in a, entropy, in 1999, kerbems setting where a, proactive password checker was, proactive password checking, reported a password experiment, wu",
author = "Jeff Yan",
year = "2001",
doi = "10.1145/508171.508194",
language = "English",
isbn = "1581134576",
series = "Proceedings of the 2001 New Security Paradigms Workshop",
publisher = "ACM",
pages = "127--135",
booktitle = "New Security Paradigms Workshop",

}

RIS

TY - GEN

T1 - A note on proactive password checking

AU - Yan, Jeff

PY - 2001

Y1 - 2001

N2 - Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In this paper, a new approach is proposed to deal with this new class of weak passwords by (roughly) measuring entropy. A simple example is given to exploit effective patterns to prevent low-entropy passwords as the first step of entropy-based proactiv¢ password checking.

AB - Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In this paper, a new approach is proposed to deal with this new class of weak passwords by (roughly) measuring entropy. A simple example is given to exploit effective patterns to prevent low-entropy passwords as the first step of entropy-based proactiv¢ password checking.

KW - 13

KW - Proactive password checking~ dictionary attack

KW - dictionary attack

KW - done in a

KW - entropy

KW - in 1999

KW - kerbems setting where a

KW - proactive password checker was

KW - proactive password checking

KW - reported a password experiment

KW - wu

U2 - 10.1145/508171.508194

DO - 10.1145/508171.508194

M3 - Conference contribution/Paper

SN - 1581134576

T3 - Proceedings of the 2001 New Security Paradigms Workshop

SP - 127

EP - 135

BT - New Security Paradigms Workshop

PB - ACM

CY - New York

ER -