Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis.
Weili HanZhigong LiMinyue NiGuofei GuWenyuan XuPublished in: IEEE Trans. Dependable Secur. Comput. (2018)
Keyphrases
- empirical analysis
- empirical studies
- theoretical analysis
- countermeasures
- information security
- security threats
- qualitative and quantitative
- traffic analysis
- user authentication
- denial of service attacks
- computer security
- quantitative and qualitative
- anomaly detection
- long term
- security protocols
- cryptographic protocols
- shadow detection
- light source
- listed companies
- short term
- keystroke dynamics
- chosen plaintext