Shadow Attacks based on Password Reuses: A Quantitative...

  • Main
  • 2016
  • Shadow Attacks based on Password Reuses: A Quantitative...

Shadow Attacks based on Password Reuses: A Quantitative Empirical View

Han, Weili, Li, Zhigong, Ni, Minyue, Gu, Guofei, Xu, Wenyuan
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Year:
2016
Language:
english
Journal:
IEEE Transactions on Dependable and Secure Computing
DOI:
10.1109/TDSC.2016.2568187
File:
PDF, 904 KB
english, 2016
Conversion to is in progress
Conversion to is failed