Shadow Attacks based on Password Reuses: A Quantitative Empirical View
Document Type
Article
Subject Area(s)
Engineering, Computer Engineering, Computer Sciences, Computer Security
Publication Info
Postprint version. Published in IEEE Transactions on Dependable and Secure Computing (TDSC), Issue 99, 2016.
Rights
© IEEE Transactions on Dependable and Secure Computing (TDSC), 2016, IEEE
Han, W., Li, Z., Ni, M., Gu, G., Xu, W. (2016). Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis. IEEE Transactions on Dependable and Secure Computing (TDSC), (99).
http://dx.doi.org/10.1109/TDSC.2016.2568187
COinS