Academic literature on the topic 'Dictionary Attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dictionary Attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Dictionary Attacks"

1

Kapoor, Pranav, Pratham Agrawal, and Aju D. "ANALYZING PASSWORD DECRYPTION TECHNIQUES USING DICTIONARY ATTACK." International Journal of Advanced Research 9, no. 08 (August 31, 2021): 515–23. http://dx.doi.org/10.21474/ijar01/13299.

Full text
Abstract:
To guard ourselves against a word attack or a breach, it is always important to have an awareness of the unremarkably used sorts of attacks. The most common type of attack is password guessing. Hackers can guess the passwords locally or remotely using either manually or through an automated approach. One such attack is Dictionary Attack. A dictionary attack tries to make an authentication mechanism fail by sequentially entering each word in a dictionary as a password or trying to find the decryption key of an encrypted message or document. In this paper, an empirical research on how dictionary attack works are performed. In addition to that, different techniques and approaches to the existing dictionary attacks are implemented to make the system more robust. Furthermore, a comparison of methods is performed to find which approach is better to protect the system.
APA, Harvard, Vancouver, ISO, and other styles
2

Dagelić, Ante, Toni Perković, Bojan Vujatović, and Mario Čagalj. "SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists." Wireless Communications and Mobile Computing 2018 (July 22, 2018): 1–15. http://dx.doi.org/10.1155/2018/5153265.

Full text
Abstract:
User’s location privacy concerns have been further raised by today’s Wi-Fi technology omnipresence. Preferred Network Lists (PNLs) are a particularly interesting source of private location information, as devices are storing a list of previously used hotspots. Privacy implications of a disclosed PNL have been covered by numerous papers, mostly focusing on passive monitoring attacks. Nowadays, however, more and more devices no longer transmit their PNL in clear, thus mitigating passive attacks. Hidden PNLs are still vulnerable against active attacks whereby an attacker mounts a fake SSID hotspot set to one likely contained within targeted PNL. If the targeted device has this SSID in the corresponding PNL, it will automatically initiate a connection with the fake hotspot thus disclosing this information to the attacker. By iterating through different SSIDs (from a predefined dictionary) the attacker can eventually reveal a big part of the hidden PNL. Considering user mobility, executing active attacks usually has to be done within a short opportunity window, while targeting nontrivial SSIDs from user’s PNL. The existing work on active attacks against hidden PNLs often neglects both of these challenges. In this paper we propose a simple mathematical model for analyzing active SSID dictionary attacks, allowing us to optimize the effectiveness of the attack under the above constraints (limited window of opportunity and targeting nontrivial SSIDs). Additionally, we showcase an example method for building an effective SSID dictionary using top-N recommender algorithm and validate our model through simulations and extensive real-life tests.
APA, Harvard, Vancouver, ISO, and other styles
3

Nam, Junghyun, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho Won. "Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks." Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/802359.

Full text
Abstract:
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.
APA, Harvard, Vancouver, ISO, and other styles
4

Lasc, Ioana, Reiner Dojen, and Tom Coffey. "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications." International Journal of Information Security and Privacy 5, no. 1 (January 2011): 33–49. http://dx.doi.org/10.4018/jisp.2011010103.

Full text
Abstract:
Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of service condition. A case study demonstrates the effectiveness of desynchronisation attacks against a security protocol for mobile satellite communications. A new mutual authentication protocol for satellite communications, incorporating a resynchronisation capability, is proposed to counter the disruptive effects of desynchronisation attacks. The new protocol has an esynchronisation phase that is initiated whenever desynchronisation is suspected. Thus, the possibility of causing permanent denial of service conditions by mounting desynchronisation attacks is eliminated. A security analysis of the proposed protocol establishes its resistance against attacks like replay attacks, dictionary attacks, and desynchronisation attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Chakrabarti, Saikat, and Mukesh Singhal. "Password-Based Authentication: Preventing Dictionary Attacks." Computer 40, no. 6 (June 2007): 68–74. http://dx.doi.org/10.1109/mc.2007.216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tajari Siahmarzkooh, A., J. Karimpour, and S. Lotfi. "A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks." Engineering, Technology & Applied Science Research 6, no. 6 (December 18, 2016): 1227–34. http://dx.doi.org/10.48084/etasr.937.

Full text
Abstract:
In this paper, we provide an approach to detect network dictionary attacks using a data set collected as flows based on which a clustered graph is resulted. These flows provide an aggregated view of the network traffic in which the exchanged packets in the network are considered so that more internally connected nodes would be clustered. We show that dictionary attacks could be detected through some parameters namely the number and the weight of clusters in time series and their evolution over the time. Additionally, the Markov model based on the average weight of clusters,will be also created. Finally, by means of our suggested model, we demonstrate that artificial clusters of the flows are created for normal and malicious traffic. The results of the proposed approach on CAIDA 2007 data set suggest a high accuracy for the model and, therefore, it provides a proper method for detecting the dictionary attack.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Chenyu, and Guoai Xu. "Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card." Security and Communication Networks 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/1619741.

Full text
Abstract:
Remote user authentication is the first step to guarantee the security of online services. Online services grow rapidly and numerous remote user authentication schemes were proposed with high capability and efficiency. Recently, there are three new improved remote user authentication schemes which claim to be resistant to various attacks. Unfortunately, according to our analysis, these schemes all fail to achieve some critical security goals. This paper demonstrates that they all suffer from offline dictionary attack or fail to achieve forward secrecy and user anonymity. It is worth mentioning that we divide offline dictionary attacks into two categories: (1) the ones using the verification from smart cards and (2) the ones using the verification from the open channel. The second is more complicated and intractable than the first type. Such distinction benefits the exploration of better design principles. We also discuss some practical solutions to the two kinds of attacks, respectively. Furthermore, we proposed a reference model to deal with the first kind of attack and proved its effectiveness by taking one of our cryptanalysis schemes as an example.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Hui. "An Improvement Password-Based Authentication Protocol Using Smart Card." Applied Mechanics and Materials 303-306 (February 2013): 2182–85. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2182.

Full text
Abstract:
To access resources from a remote system, the user authentication is a very important security mechanism. Among remote authentication protocol, password-based authenticated key exchange protocol is most popular since the two communication entities only shared a human-memorable password can establish a session key which is used to protected their later communication over an insecure networks. Recently, Xu Zhu proposed improved password-based protocol using smart card based on previous research. He claims that his protocol is secure against various attacks. However, Song points out that the Xu Zhu’s protocol suffers from attacks. In addition, Song gives an improved version of Xu Zhu. In this paper, we first found Song’s protocol also is vulnerable to off-line dictionary attack. Later, we extend Song’s protocol so that the extended protocol can resist to off-line dictionary attack even if an adversary captures the smart card.
APA, Harvard, Vancouver, ISO, and other styles
9

Sekhar Reddy, Y. Chandra, M. Venkateswara Rao, M. Kameswara Rao, C. V. Phaneendra Kumar, and A. Anil Sai. "Graphical Password Using Captcha." International Journal of Advances in Applied Sciences 5, no. 2 (June 1, 2016): 94. http://dx.doi.org/10.11591/ijaas.v5.i2.pp94-100.

Full text
Abstract:
In this 21st century one of the main issue to tackle was Cyber Security attack. We have numerous authentication processes like two key factor passwords, graphical passwords and many other. Text based passwords are prone to many attacks like dictionary attacks. In this paper, we have implemented a new authentication method namely; a family of graphical passwords built on Captcha technology. As graphical password addresses many security problems like online guessing attacks, relay attacks etc. Captcha is used to distinguish humans and bots. So, we use images with captcha’s as one of the authentication step along with normal alpha-numeric password. It also overcome the problems of pass points in graphical password systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Chenyu, Guoai Xu, and Wenting Li. "A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment." Security and Communication Networks 2018 (2018): 1–15. http://dx.doi.org/10.1155/2018/9062675.

Full text
Abstract:
With the great development of network technology, the multiserver system gets widely used in providing various of services. And the two-factor authentication protocols in multiserver system attract more and more attention. Recently, there are two new schemes for multiserver environment which claimed to be secure against the known attacks. However, after a scrutinization of these two schemes, we found that (1) their description of the adversary’s abilities is inaccurate; (2) their schemes suffer from many attacks. Thus, firstly, we corrected their description on the adversary capacities to introduce a widely accepted adversary model and then summarized fourteen security requirements of multiserver based on the works of pioneer contributors. Secondly, we revealed that one of the two schemes fails to preserve forward secrecy and user anonymity and cannot resist stolen-verifier attack and off-line dictionary attack and so forth and also demonstrated that another scheme fails to preserve forward secrecy and user anonymity and is not secure to insider attack and off-line dictionary attack, and so forth. Finally, we designed an enhanced scheme to overcome these identified weaknesses, proved its security via BAN logic and heuristic analysis, and then compared it with other relevant schemes. The comparison results showed the superiority of our scheme.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Dictionary Attacks"

1

Mandapaka, Ajay. "A STUDY ON HOMOPHONE WORDS IN THE DICTIONARY-BASED PASSWORD CRACKING." OpenSIUC, 2017. https://opensiuc.lib.siu.edu/theses/2247.

Full text
Abstract:
Password cracking based on dictionary attacks have been confined only to the use of dictionary strings which make sense to both humans and the computer or are usually alphanumeric keyboard patterns. But here we also try to extend the dictionary attacks to homophones which the millennials tend to use more often. The word LOVE is used as LUV, LAV. Based on the pronunciation of a word there can be many spellings to it. Phoneme to Grapheme Correspondences have a great amount of significance here. So here in this research we try to incorporate all such words in the attacking dictionary with the highest possible probabilities to see if it has any impact on the password cracking efficiency. We use the probabilistic context-free grammar password cracker to see what our test results yield.
APA, Harvard, Vancouver, ISO, and other styles
2

Činčala, Martin. "Detekce slovníkových útoků na síťové služby analýzou IP toků." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234968.

Full text
Abstract:
Existing research suggests that it is possible to detect dictionary attacks using IP flows. This type of detection was successfully implemented for SSH, LDAP and RDP protocols. To determine whether it is possible to use the same methods of detection for e-mail protocols virtual test environment was created. I deduced the characteristics of attacks in flows from the data, which I gained from this virtual environment. Than I chose the statistical value that separates the attacks from legitimate traffic. Variance of specific flow parameters was chosen as main characteristic of attacks. IP addresses with flows that have small variance of chosen parameters and high frequency of packet arrival are considered untrustworthy. Variance is calculated from IP history to rule out false positives. The IP history of legitimate user contains variation of flows which prevents marking this IP address as dangerous. On the basis of this principal the script, which detects the attacks from the nfdump output, was created. The success of detection of the attacks was tested on classificated data from the real environment. The results of tests showed, that with good configuration of marginal values the percentage of detected attacks is high and there are no false positives. Detection is not limited only on mail protocols. With regard to universal design, the script is able to detect dictionary attacks on SSH, LDAP, SIP, RDP, SQL, telnet and some other attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

Golrang, Mohammad Saleh. "CredProxy: A Password Manager for Online Authentication Environments." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23611.

Full text
Abstract:
Internet users are increasingly required to sign up for online services and establish accounts before receiving service from websites. On the one hand, generation of strong usernames and passwords is a difficult task for the user. On the other hand, memorization of strong passwords is by far more problematic for the average user. Thus, the average user has a tendency to use weak passwords, and also reuse his passwords for more than one website, which makes several attacks feasible. Under the aforementioned circumstances, the use of password managers is beneficial, since they unburden the user from the task of memorizing user credentials. However, password managers have a number of weaknesses. This thesis is mainly aimed at alleviating some of the intrinsic weaknesses of password managers. We propose three cryptographic protocols which can improve the security of password managers while enhancing user convenience. We also present the design of a phishing and Man-in-the-Browser resistant password manger which best fits into our scheme. Furthermore, we present our novel virtual on-screen keyboard and keypad which are designed to provide strong protection mechanisms against threats such as keylogging and shoulder surfing.
APA, Harvard, Vancouver, ISO, and other styles
4

Wheeler, Ryan. "BlindCanSeeQL: Improved Blind SQL Injection For DB Schema Discovery Using A Predictive Dictionary From Web Scraped Word Based Lists." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6050.

Full text
Abstract:
SQL Injections are still a prominent threat on the web. Using a custom built tool, BlindCanSeeQL (BCSQL), we will explore how to automate Blind SQL attacks to discover database schema using fewer requests than the standard methods, thus helping avoid detection from overloading a server with hits. This tool uses a web crawler to discover keywords that assist with autocompleting schema object names, along with improvements in ASCII bisection to lower the number of requests sent to the server. Along with this tool, we will discuss ways to prevent and protect against such attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Gregr, Filip. "Generátor kybernetických útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317214.

Full text
Abstract:
This thesis is focused on developing a tool that is capable of generating cyber attacks. In the opening there are introduced some attacks using the ISO/OSI application layer protocols. Specifically, these are attacks known as Slowloris, RUDY, Slow Read, HTTP flood, and dictionary attack on the SSH. These attacks are implemented into an existing DoSgen Linux tool that already contains several famous network attacks. The main part of the thesis is devoted to the description of the tool and to the implementation of its own extension. The created tool is practically tested in an experimental enviroment against the Apache web server. Part of the thesis is the documentation for the improved DoSgen tool.
APA, Harvard, Vancouver, ISO, and other styles
6

Alesand, Elias, and Hanna Sterneling. "A shoulder-surfing resistant graphical password system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138163.

Full text
Abstract:
The focus of this report is to discuss graphical password systems and how they can contribute to handle security problems that threaten authentication processes. One such threat is shoulder-surfing attacks, which are also reviewed in this report. Three already existing systems that are claimed to be shoulder-surfing resilient are described and a new proposed system is presented and evaluated through a user study. Moreover, the system is compared to the mentioned existing systems to further evaluate the usability, memorability and the time it takes to authenticate. The user study shows that test subjects are able to remember their chosen password one week after having registered and signed in once. It is also shown that the average time to sign in to the system after five minutes of practice is within a range of 3.30 to 5.70 seconds. The participants in the experiments gave the system an average score above 68 on the System Usability Scale, which is the score of an average system.
APA, Harvard, Vancouver, ISO, and other styles
7

Huss, Joar. "Optimizing the slag system for phosphorus removal in a DRI-based EAF-process using the dictionary attack method." Thesis, KTH, Materialvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229743.

Full text
Abstract:
Abstract Carbon emissions pose a serious threat to the continued survival of this planet. All sectors of society must, therefore, lower their emissions, this includes the steel industry. The production of steel is based on iron ore reduction by carbon. In an attempt to relieve the steel industry from its inherent fossil dependence an initiative called HYBRIT has been started. It aims to supplant carbon reduction with hydrogen reduction. Currently, there is no economically viable industrial production of steel that uses fossil-free hydrogen as reduction agent. In order to create economic viability for such a process work has to be conducted to innovate and optimize. This study aims to be a part of that optimization process by creating a tool for optimizing the slag system with regards to phosphorus removal. 26843 slag compositions were evaluated using modules written in “Matlab” combined with “Thermo-Calc”. 1583 possible slag compositions were found to be suitable for phosphorus removal. These compositions were then optimized after slag weight in order to minimize slag associated cost. The compositions were tested against two theoretical raw materials with varying initial phosphorus content 250 ppm and 125 ppm. It was found that the initial phosphorus concentration of the raw material has a substantial impact not only on the slag costs but also the slag praxis that should be used.
APA, Harvard, Vancouver, ISO, and other styles
8

Prustoměrský, Milan. "Užití techniky lámání hesel u komprimačních formátů RAR, ZIP a 7z a extrakce hesel z samorozbalovacích archivů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236371.

Full text
Abstract:
This Thesis deals with analysis of the possiblity of password breakthrough for common compression formats and password extraction from self-extraction archives used for malicious software. Structure of compression programs, ciphers and connection between cipher and archives is described. Common and specialized attacks on archives and ciphers are described. Structure of self-extracting archives and password location is used to create extractor of passwords in self-extracting archives.
APA, Harvard, Vancouver, ISO, and other styles
9

Pavlík, Martin. "Metody ukládání uživatelských hesel v operačních systémech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218113.

Full text
Abstract:
This master thesis deals with ways to store passwords in current operating systems. Specifically, this work focuses on Windows, Linux, BSD and OS X. These systems are examined for ways of hashing passwords and on resistance of resulting hashes against various attacks. First (theoretical) section describes the procedures and algorithms that are needed for user authentication. This part also describes methods of hash storing. At the end of the theoretical part are generally described some possible attacks against hash functions. In second (practical) part is described and tested tools for obtaining hashes of the investigated operating systems. Subsequently practical attacks were conducted against obtained hashes by using appropriate tools. Furthermore there are presented results of the attacks. In the conclusion of the work there is a comparison of tools and methods which were used to obtain plaintext passwords from operating systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Lištiak, Filip. "Zdokonalení pravděpodobnostních metod pro lámání hesel." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403174.

Full text
Abstract:
This thesis describes passwords cracking using probabilistic context-free grammars, specifically PCFG Cracker tool. The aim of the thesis is to design and implement enhancements to this tool, which reduce the size of output dictionaries while maintaining acceptable success rate. This work also solves critical parts in the tool that slow down the overall duration of the program. Another goal of the thesis is to analyze and implement targeted attack dictionaries that increase the scope and success rate of generated passwords.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Dictionary Attacks"

1

Parker, Philip M., and James N. Parker. Panic attacks: A medical dictionary, bibliography, and annotated research guide to Internet references. San Diego, CA: ICON Health, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Parker, James N., and Philip M. Parker. Anxiety attacks: A medical dictionary, bibliography, and annotated research guide to internet references. San Diego, CA: ICON Health Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reynolds, David West. Star Wars, attack of the clones: The visual dictionary. New York: DK Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reynolds, David West. Star wars: The visual dictionary. New York: DK Pub., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Turull i Crexells, Isabel. Carles Riba i la llengua literària durant el franquisme. Venice: Edizioni Ca' Foscari, 2018. http://dx.doi.org/10.30687/978-88-6969-309-0.

Full text
Abstract:
Carles Riba, one of the most relevant personalities in Catalan letters, not only as a poet but also as a linguist, has been considered a difficult writer. This book aims to examine how his theoretical preparation and his ideas in linguistics influenced his work in the particular case of some early stories in which he tries “uns utilíssims exercicis de simplicitat”. Carles Riba did not present his linguistic theories in a single text in a complete and articulated way but we can evaluate them in various papers he wrote and published up until his death in 1959. The first part of this work, after an introduction which sets the author in the context of European linguistics, is a review of the ideas that can be found in the collections of essays: Escolis i altres articles (1921), Els marges (1927), Per comprendre (1937), ... més els poemes (1957), and in a few other particularly interesting papers.This part focuses also on some of the controversies in which Carles Riba is involved as a linguist during the spanish dictatorship: especially his role on the publication of the second edition of Pompeu Fabra’s dictionary in 1954 and the consequences of the prologue he wrote for the volume. Joan Coromines considers an attack on the linguist Pompeu Fabra the negative comparison Riba proposes with the honnête homme: in our research we re-evaluate this consideration and analyse the historical and semantic value of this expression belonging to 17th-century French culture.The second part of this paper is a strictly linguistic analysis of three texts, chosen among Carles Riba’s works for children. The interest of those texts is in the author’s deliberate intent of using the most simple language, which enables us to determine what he considers the basic aspects of linguistic quality. Furthermore, the existence of different editions of those texts permits a philological analysis of those versions showing Carles Riba’s ‘simple’ language in three very representative moments, from the beginning of his career as a writer to the difficult situation during the dictatorship.
APA, Harvard, Vancouver, ISO, and other styles
6

Publications, ICON Health. Anxiety Attacks - A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. ICON Health Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Publications, ICON Health. Panic Attacks - A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. ICON Health Publications, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Reynolds, David West. The Visual Dictionary of Star Wars, Episode II - Attack of the Clones. DK CHILDREN, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Publications, ICON Health. Heart Attack - A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. ICON Health Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bernier, Jean. Pierre Bayle and Biblical Criticism. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198806837.003.0012.

Full text
Abstract:
The Huguenot refugee Pierre Bayle (1647–1706) quickly gained fame in the Republic of Letters as an omnivorous reader and prolific writer. He also touched upon the interpretation of biblical texts, but his interest in the subject developed only gradually. This chapter distinguishes four periods. In the first stage, Bayle studied the Bible thoroughly, but without any knowledge of biblical criticism. Nonetheless he thought that ‘a clever man’ could profit from it in order to arrive at a better understanding of the Bible. In his second phase, a genuine interest in biblical criticism was fuelled by Richard Simon’s attacks on the reliability of the text. In the third phase, Bayle ventured to acclaim Simon’s highly controversial works for their precise and balanced judgements on many delicate religious issues. Finally, in the Dictionaire historique et critique Bayle engaged in the practice of biblical criticism himself.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Dictionary Attacks"

1

Drašar, Martin. "Protocol-Independent Detection of Dictionary Attacks." In Lecture Notes in Computer Science, 304–9. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40552-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bellare, Mihir, David Pointcheval, and Phillip Rogaway. "Authenticated Key Exchange Secure against Dictionary Attacks." In Advances in Cryptology — EUROCRYPT 2000, 139–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45539-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Canetti, Ran, Shai Halevi, and Michael Steiner. "Mitigating Dictionary Attacks on Password-Protected Local Storage." In Lecture Notes in Computer Science, 160–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11818175_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pereira, Mayana, Shaun Coleman, Bin Yu, Martine DeCock, and Anderson Nascimento. "Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic." In Research in Attacks, Intrusions, and Defenses, 295–314. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00470-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bresson, Emmanuel, Olivier Chevassut, and David Pointcheval. "Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks." In Lecture Notes in Computer Science, 497–514. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36178-2_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Peng, Yongdae Kim, Vishal Kher, and Taekyoung Kwon. "Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks." In Applied Cryptography and Network Security, 17–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496137_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pignolet, Yvonne-Anne, Stefan Schmid, and Gilles Tredan. "Request Complexity of VNet Topology Extraction: Dictionary-Based Attacks." In Networked Systems, 190–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40148-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Adams, Carlisle. "Dictionary Attack." In Encyclopedia of Cryptography and Security, 332. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Adams, Carlisle. "Dictionary Attack." In Encyclopedia of Cryptography, Security and Privacy, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_74-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stubblebine, S., and P. C. van Oorschot. "Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop." In Financial Cryptography, 39–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27809-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Dictionary Attacks"

1

Pinkas, Benny, and Tomas Sander. "Securing passwords against dictionary attacks." In the 9th ACM conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/586110.586133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Berger, Yigael, Avishai Wool, and Arie Yeredor. "Dictionary attacks using keyboard acoustic emanations." In the 13th ACM conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1180405.1180436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marras, Mirko, Paweł Korus, Nasir Memon, and Gianni Fenu. "Adversarial Optimization for Dictionary Attacks on Speaker Verification." In Interspeech 2019. ISCA: ISCA, 2019. http://dx.doi.org/10.21437/interspeech.2019-2430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dandass, Yoginder S. "Using FPGAs to Parallelize Dictionary Attacks for Password Cracking." In 2008 41st Annual Hawaii International Conference on System Sciences. IEEE, 2008. http://dx.doi.org/10.1109/hicss.2008.484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Narayanan, Arvind, and Vitaly Shmatikov. "Fast dictionary attacks on passwords using time-space tradeoff." In the 12th ACM conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1102120.1102168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lane Thames, J., Randal Abler, and David Keeling. "A distributed active response architecture for preventing SSH dictionary attacks." In Southeastcon 2008. IEEE, 2008. http://dx.doi.org/10.1109/secon.2008.4494264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bontrager, Philip, Aditi Roy, Julian Togelius, Nasir Memon, and Arun Ross. "DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*." In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2018. http://dx.doi.org/10.1109/btas.2018.8698539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Andriamilanto, Nampoina, Tristan Allard, and Gaëtan Le Guelvouit. "FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms." In ACSAC '20: Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3427228.3427297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Onda, Yasunori, SeongHan Shin, Kazukuni Kobara, and Hideki Imai. "How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication." In Its Applications (Isita2010). IEEE, 2010. http://dx.doi.org/10.1109/isita.2010.5649727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vykopal, Jan, Tomas Plesnik, and Pavel Minarik. "Network-Based Dictionary Attack Detection." In 2009 International Conference on Future Networks, ICFN. IEEE, 2009. http://dx.doi.org/10.1109/icfn.2009.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography