Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3667
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Korkmaz I. | - |
dc.contributor.author | Dalkilic M.E. | - |
dc.date.accessioned | 2023-06-16T15:01:54Z | - |
dc.date.available | 2023-06-16T15:01:54Z | - |
dc.date.issued | 2010 | - |
dc.identifier.isbn | 9.78145E+12 | - |
dc.identifier.uri | https://doi.org/10.1145/1854099.1854113 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/3667 | - |
dc.description | Microsoft Russia;Russian Foundation for Basic Research | en_US |
dc.description | 3rd International Conference on Security of Information and Networks, SIN 2010 -- 7 September 2010 through 11 September 2010 -- Taganrog, Rostov-on-Don -- 82007 | en_US |
dc.description.abstract | Considering the computer authentication, any password shall not only be private to its owner but also be chosen as not to be predicted easily by others. The passwords used in authentication processes of any critical system should be strong as not to be cracked easily. In this context, the strong password choice gets significance for the general system security. This study aims to reveal the proper and improper properties on password preferences via examining the real samples. The method used in this work is first to gather the real passwords in plaintext, then to crack the encrypted forms of them and finally to investigate statistical queries on those passwords in order to distinguish the common weak and strong characteristics As the case study, the experiments are conducted on real passwords of Turkish users in an actively running system. The results of the experiments are categorized for weak and strong passwords. Moreover, the common tendencies on password choice are evaluated. Copyright 2010 ACM. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | SIN'10 - Proceedings of the 3rd International Conference of Security of Information and Networks | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Password checking | en_US |
dc.subject | Password choice tendency | en_US |
dc.subject | Password cracking | en_US |
dc.subject | Security | en_US |
dc.subject | Strong password | en_US |
dc.subject | Weak password | en_US |
dc.subject | Password checking | en_US |
dc.subject | Password choice tendency | en_US |
dc.subject | Password cracking | en_US |
dc.subject | Security | en_US |
dc.subject | Strong password | en_US |
dc.subject | Weak password | en_US |
dc.subject | Authentication | en_US |
dc.subject | Experiments | en_US |
dc.subject | Frequency hopping | en_US |
dc.subject | Security of data | en_US |
dc.title | The weak and the strong password preferences: A case study on Turkish users | en_US |
dc.type | Conference Object | en_US |
dc.identifier.doi | 10.1145/1854099.1854113 | - |
dc.identifier.scopus | 2-s2.0-77958058165 | en_US |
dc.authorscopusid | 25641368900 | - |
dc.identifier.startpage | 56 | en_US |
dc.identifier.endpage | 61 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.grantfulltext | reserved | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
2753.pdf Restricted Access | 507.65 kB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
3
checked on Nov 20, 2024
Page view(s)
62
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.