[1] KEITH M, SHAO B, STEINBART P J. The usability of passphrases for authentication:an empirical field study[J]. International Journal of Human-Computer Studies, 2007, 65(1):17-28. [2] CLAIR L S, JOHANSEN L, ENCK W, et al. Password exhaustion:Predicting the end of password usefulness[C]//Proceedings of the 2nd International Conference on Information Systems Security. Berlin:Springer, 2006:37-55. [3] BRUMEN B, TANESKI V. Moore's curse on textual passwords[C]//Proceedings of the 201538th International Convention on Information and Communication Technology, Electronics and Microelectronics. Piscataway, NJ:IEEE, 2015:1360-1365. [4] BURR W E, DODSON D F, POLK W T. Electronic authentication guideline[EB/OL].[2017-06-20]. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-2.pdf. [5] WEIR M, AGGARWAL S, COLLINS M, et al. Testing metrics for password creation policies by attacking large sets of revealed passwords[C]//Proceedings of the 17th ACM Conference on Computer and Communications Security. New York:ACM, 2010:162-175. [6] KELLEY P G, KOMANDURI S, MAZUREK M L, et al. Guess again (and again and again):measuring password strength by simulating password-cracking algorithms[C]//Proceedings of the 2012 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2012:523-537. [7] RABINER L R. A tutorial on hidden Markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989, 77(2):257-286. [8] WEIR M, AGGARWAL S, de MEDEIROS B, et al. Password cracking using probabilistic context-free grammars[C]//Proceedings of the 200930th IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2009:391-405. [9] What the most common passwords of 2016 list reveals[EB/OL].[2017-10-24].https://blog.keepersecurity.com/2017/01/13/most-common-passwords-of-2016-research-study/. [10] Password meter[EB/OL].[2017-10-24]. http://www.passwordmeter.com/. [11] Test your password[EB/OL].[2017-10-24]. http://www.testyourpassword.com/. [12] Microsoft. Safety and security center:password checker[EB/OL].[2017-10-24]. http://www.microsoft.com/it-it/security/pc-security/passwordchecker.aspx. [13] NARAYANAN A, SHMATIKOV V. Fast dictionary attacks on passwords using time-space tradeoff[C]//Proceedings of the 12th ACM Conference on Computer and Communications Security. New York:ACM, 2005:364-372. [14] MA J, YANG W, LUO M, et al. A study of probabilistic password models[C]//Proceedings of the 2014 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2014:689-704. [15] WANG D, HE D, CHENG H, et al. fuzzyPSM:a new password strength meter using fuzzy probabilistic context-free grammars[C]//Proceedings of the 201646th Annual IEEE/IFIP International Conference on Dependable Systems and Network. Piscataway, NJ:IEEE, 2016:595-606. |