A Systematic Review on Password Guessing Tasks

W Yu, Q Yin, H Yin, W Xiao, T Chang, L He, L Ni, Q Ji - Entropy, 2023 - mdpi.com
Recently, many password guessing algorithms have been proposed, seriously threatening
cyber security. In this paper, we systematically review over thirty methods for password …

Birthday, name and bifacial-security: understanding passwords of Chinese web users

D Wang, P Wang, D He, Y Tian - 28th USENIX security symposium …, 2019 - usenix.org
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …

How to attack and generate honeywords

D Wang, Y Zou, Q Dong, Y Song… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …

Honeyword-based authentication techniques for protecting passwords: A survey

N Chakraborty, J Li, VCM Leung, S Mondal… - ACM Computing …, 2022 - dl.acm.org
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest
in 2013, has emerged as a security mechanism that can provide security against server-side …

Security analysis of the whatsapp end-to-end encrypted backup protocol

GT Davies, S Faller, K Gellert, T Handirk… - Annual International …, 2023 - Springer
WhatsApp is an end-to-end encrypted (E2EE) messaging service used by billions of people.
In late 2021, WhatsApp rolled out a new protocol for backing up chat histories. The E2EE …

Updatable oblivious key management for storage systems

S Jarecki, H Krawczyk, J Resch - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
We introduce Oblivious Key Management Systems (KMS) as a much more secure
alternative to traditional wrapping-based KMS that form the backbone of key management in …

A formal treatment of end-to-end encrypted cloud storage

M Backendal, H Davis, F Günther, M Haller… - Annual International …, 2024 - Springer
Users increasingly store their data in the cloud, thereby benefiting from easy access,
sharing, and redundancy. To additionally guarantee security of the outsourced data even …

Yoroi: Updatable whitebox cryptography

Y Koike, T Isobe - IACR Transactions on Cryptographic Hardware and …, 2021 - tches.iacr.org
Whitebox cryptography aims to provide security in the whitebox setting where the adversary
has unlimited access to the implementation and its environment. In order to ensure security …

DPaSE: distributed password-authenticated symmetric-key encryption, or how to get many keys from one password

P Das, J Hesse, A Lehmann - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
Cloud storage is becoming increasingly popular among end users that outsource their
personal data to services such as Dropbox or Google Drive. For security, uploaded data …

Blockchain-based portable authenticated data transmission for mobile edge computing: a universally composable secure solution

S Li, Y Zhang, Y Song, N Cheng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In mobile edge computing (MEC) systems, data is frequently transmitted between MEC
servers and users holding mobile devices for supporting related services. However, critical …