Academic literature on the topic 'Dictionary Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dictionary Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Dictionary Attacks"
Kapoor, Pranav, Pratham Agrawal, and Aju D. "ANALYZING PASSWORD DECRYPTION TECHNIQUES USING DICTIONARY ATTACK." International Journal of Advanced Research 9, no. 08 (August 31, 2021): 515–23. http://dx.doi.org/10.21474/ijar01/13299.
Full textDagelić, Ante, Toni Perković, Bojan Vujatović, and Mario Čagalj. "SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists." Wireless Communications and Mobile Computing 2018 (July 22, 2018): 1–15. http://dx.doi.org/10.1155/2018/5153265.
Full textNam, Junghyun, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho Won. "Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks." Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/802359.
Full textLasc, Ioana, Reiner Dojen, and Tom Coffey. "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications." International Journal of Information Security and Privacy 5, no. 1 (January 2011): 33–49. http://dx.doi.org/10.4018/jisp.2011010103.
Full textChakrabarti, Saikat, and Mukesh Singhal. "Password-Based Authentication: Preventing Dictionary Attacks." Computer 40, no. 6 (June 2007): 68–74. http://dx.doi.org/10.1109/mc.2007.216.
Full textTajari Siahmarzkooh, A., J. Karimpour, and S. Lotfi. "A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks." Engineering, Technology & Applied Science Research 6, no. 6 (December 18, 2016): 1227–34. http://dx.doi.org/10.48084/etasr.937.
Full textWang, Chenyu, and Guoai Xu. "Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card." Security and Communication Networks 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/1619741.
Full textLiu, Hui. "An Improvement Password-Based Authentication Protocol Using Smart Card." Applied Mechanics and Materials 303-306 (February 2013): 2182–85. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2182.
Full textSekhar Reddy, Y. Chandra, M. Venkateswara Rao, M. Kameswara Rao, C. V. Phaneendra Kumar, and A. Anil Sai. "Graphical Password Using Captcha." International Journal of Advances in Applied Sciences 5, no. 2 (June 1, 2016): 94. http://dx.doi.org/10.11591/ijaas.v5.i2.pp94-100.
Full textWang, Chenyu, Guoai Xu, and Wenting Li. "A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment." Security and Communication Networks 2018 (2018): 1–15. http://dx.doi.org/10.1155/2018/9062675.
Full textDissertations / Theses on the topic "Dictionary Attacks"
Mandapaka, Ajay. "A STUDY ON HOMOPHONE WORDS IN THE DICTIONARY-BASED PASSWORD CRACKING." OpenSIUC, 2017. https://opensiuc.lib.siu.edu/theses/2247.
Full textČinčala, Martin. "Detekce slovníkových útoků na síťové služby analýzou IP toků." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234968.
Full textGolrang, Mohammad Saleh. "CredProxy: A Password Manager for Online Authentication Environments." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23611.
Full textWheeler, Ryan. "BlindCanSeeQL: Improved Blind SQL Injection For DB Schema Discovery Using A Predictive Dictionary From Web Scraped Word Based Lists." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6050.
Full textGregr, Filip. "Generátor kybernetických útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317214.
Full textAlesand, Elias, and Hanna Sterneling. "A shoulder-surfing resistant graphical password system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138163.
Full textHuss, Joar. "Optimizing the slag system for phosphorus removal in a DRI-based EAF-process using the dictionary attack method." Thesis, KTH, Materialvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229743.
Full textPrustoměrský, Milan. "Užití techniky lámání hesel u komprimačních formátů RAR, ZIP a 7z a extrakce hesel z samorozbalovacích archivů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236371.
Full textPavlík, Martin. "Metody ukládání uživatelských hesel v operačních systémech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218113.
Full textLištiak, Filip. "Zdokonalení pravděpodobnostních metod pro lámání hesel." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403174.
Full textBooks on the topic "Dictionary Attacks"
Parker, Philip M., and James N. Parker. Panic attacks: A medical dictionary, bibliography, and annotated research guide to Internet references. San Diego, CA: ICON Health, 2004.
Find full textParker, James N., and Philip M. Parker. Anxiety attacks: A medical dictionary, bibliography, and annotated research guide to internet references. San Diego, CA: ICON Health Publications, 2003.
Find full textReynolds, David West. Star Wars, attack of the clones: The visual dictionary. New York: DK Pub., 2002.
Find full textTurull i Crexells, Isabel. Carles Riba i la llengua literària durant el franquisme. Venice: Edizioni Ca' Foscari, 2018. http://dx.doi.org/10.30687/978-88-6969-309-0.
Full textPublications, ICON Health. Anxiety Attacks - A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. ICON Health Publications, 2003.
Find full textPublications, ICON Health. Panic Attacks - A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. ICON Health Publications, 2004.
Find full textReynolds, David West. The Visual Dictionary of Star Wars, Episode II - Attack of the Clones. DK CHILDREN, 2002.
Find full textPublications, ICON Health. Heart Attack - A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. ICON Health Publications, 2003.
Find full textBernier, Jean. Pierre Bayle and Biblical Criticism. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198806837.003.0012.
Full textBook chapters on the topic "Dictionary Attacks"
Drašar, Martin. "Protocol-Independent Detection of Dictionary Attacks." In Lecture Notes in Computer Science, 304–9. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40552-5_30.
Full textBellare, Mihir, David Pointcheval, and Phillip Rogaway. "Authenticated Key Exchange Secure against Dictionary Attacks." In Advances in Cryptology — EUROCRYPT 2000, 139–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45539-6_11.
Full textCanetti, Ran, Shai Halevi, and Michael Steiner. "Mitigating Dictionary Attacks on Password-Protected Local Storage." In Lecture Notes in Computer Science, 160–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11818175_10.
Full textPereira, Mayana, Shaun Coleman, Bin Yu, Martine DeCock, and Anderson Nascimento. "Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic." In Research in Attacks, Intrusions, and Defenses, 295–314. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00470-5_14.
Full textBresson, Emmanuel, Olivier Chevassut, and David Pointcheval. "Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks." In Lecture Notes in Computer Science, 497–514. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36178-2_31.
Full textWang, Peng, Yongdae Kim, Vishal Kher, and Taekyoung Kwon. "Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks." In Applied Cryptography and Network Security, 17–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496137_2.
Full textPignolet, Yvonne-Anne, Stefan Schmid, and Gilles Tredan. "Request Complexity of VNet Topology Extraction: Dictionary-Based Attacks." In Networked Systems, 190–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40148-0_14.
Full textAdams, Carlisle. "Dictionary Attack." In Encyclopedia of Cryptography and Security, 332. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_74.
Full textAdams, Carlisle. "Dictionary Attack." In Encyclopedia of Cryptography, Security and Privacy, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_74-2.
Full textStubblebine, S., and P. C. van Oorschot. "Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop." In Financial Cryptography, 39–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27809-2_5.
Full textConference papers on the topic "Dictionary Attacks"
Pinkas, Benny, and Tomas Sander. "Securing passwords against dictionary attacks." In the 9th ACM conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/586110.586133.
Full textBerger, Yigael, Avishai Wool, and Arie Yeredor. "Dictionary attacks using keyboard acoustic emanations." In the 13th ACM conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1180405.1180436.
Full textMarras, Mirko, Paweł Korus, Nasir Memon, and Gianni Fenu. "Adversarial Optimization for Dictionary Attacks on Speaker Verification." In Interspeech 2019. ISCA: ISCA, 2019. http://dx.doi.org/10.21437/interspeech.2019-2430.
Full textDandass, Yoginder S. "Using FPGAs to Parallelize Dictionary Attacks for Password Cracking." In 2008 41st Annual Hawaii International Conference on System Sciences. IEEE, 2008. http://dx.doi.org/10.1109/hicss.2008.484.
Full textNarayanan, Arvind, and Vitaly Shmatikov. "Fast dictionary attacks on passwords using time-space tradeoff." In the 12th ACM conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1102120.1102168.
Full textLane Thames, J., Randal Abler, and David Keeling. "A distributed active response architecture for preventing SSH dictionary attacks." In Southeastcon 2008. IEEE, 2008. http://dx.doi.org/10.1109/secon.2008.4494264.
Full textBontrager, Philip, Aditi Roy, Julian Togelius, Nasir Memon, and Arun Ross. "DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*." In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2018. http://dx.doi.org/10.1109/btas.2018.8698539.
Full textAndriamilanto, Nampoina, Tristan Allard, and Gaëtan Le Guelvouit. "FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms." In ACSAC '20: Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3427228.3427297.
Full textOnda, Yasunori, SeongHan Shin, Kazukuni Kobara, and Hideki Imai. "How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication." In Its Applications (Isita2010). IEEE, 2010. http://dx.doi.org/10.1109/isita.2010.5649727.
Full textVykopal, Jan, Tomas Plesnik, and Pavel Minarik. "Network-Based Dictionary Attack Detection." In 2009 International Conference on Future Networks, ICFN. IEEE, 2009. http://dx.doi.org/10.1109/icfn.2009.36.
Full text