Shadow Attacks based on Password Reuses: A Quantitative Empirical View

Document Type

Article

Subject Area(s)

Engineering, Computer Engineering, Computer Sciences, Computer Security

Rights

© IEEE Transactions on Dependable and Secure Computing (TDSC), 2016, IEEE

Han, W., Li, Z., Ni, M., Gu, G., Xu, W. (2016). Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis. IEEE Transactions on Dependable and Secure Computing (TDSC), (99).

http://dx.doi.org/10.1109/TDSC.2016.2568187

Share

COinS