Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243769
|View full text |Cite
|
Sign up to set email alerts
|

On the Accuracy of Password Strength Meters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
50
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 67 publications
(52 citation statements)
references
References 26 publications
1
50
1
Order By: Relevance
“…For instance, let us suppose we wish to infer the minimum length constraint specified by the policy that the 000webhost set [11] was created under (that is, α = length). In this case, previous research [7] has established that the answer is 6, and yet the data in Table IV would seem to contradict this-there are passwords shorter than this present in the data. It is readily apparent how the data in Table IV may be used to determine the minimum length constraint in the 000webhost policy.…”
Section: Attribute (α) Description Lengthcontrasting
confidence: 53%
See 4 more Smart Citations
“…For instance, let us suppose we wish to infer the minimum length constraint specified by the policy that the 000webhost set [11] was created under (that is, α = length). In this case, previous research [7] has established that the answer is 6, and yet the data in Table IV would seem to contradict this-there are passwords shorter than this present in the data. It is readily apparent how the data in Table IV may be used to determine the minimum length constraint in the 000webhost policy.…”
Section: Attribute (α) Description Lengthcontrasting
confidence: 53%
“…This study was later replicated by Mayer et al in [8]. In [7], Golla and Dürmuth make extensive use of password data dumps where the password composition policy is known.…”
Section: Related Workmentioning
confidence: 91%
See 3 more Smart Citations