期刊文献+

基于口令因子的web口令安全性评估方法研究

Password Security Evaluation Method Based on Password Factor for Web
下载PDF
导出
摘要 口令是应用最为广泛的身份认证方法,web口令的安全性是影响网络环境安全的一个重要因素。本文通过对大规模的真实Web明文口令进行分析和挖掘,将口令拆分成口令因子的方式,总结出用户设置Web口令的特征和真实性规则。并将这些特征和设置规则作为评估参数,运用模糊综合评价法和层次分析法对web口令安全性进行评估。 Password is the most widely used authentication method, and the security of Web password is an important factor affecting the security of network environment. Through analyzing and mining large-scale real Web plaintext passwords, this paper summarizes the characteristics and authenticity rules of setting Web passwords by splitting passwords into password factors. Taking these features and setting rules as evaluation parameters, the security of Web password is evaluated by fuzzy comprehensive evaluation method and analytic hierarchy process.
作者 李蓓蕾 唐祖锴 陈燕 LI Bei-lei;TANG Zu-kai;CHEN Yan(School of Computer Science and Technology,Wuhan University of Technology,Wuhan 430070,China)
出处 《湖北第二师范学院学报》 2018年第8期35-39,共5页 Journal of Hubei University of Education
关键词 口令因子 明文口令 口令安全性 口令组成规则 password factor plaintext password password security password composition rule
  • 相关文献

参考文献8

二级参考文献35

  • 1黄昌宁.中文信息处理中的分词问题[J].语言文字应用,1997(1):74-80. 被引量:83
  • 2刘开瑛.歧义切分与专有名词识别软件[J].语言文字应用,2001(3):9-15. 被引量:4
  • 3颜跃进,李舟军,陈火旺.基于FP-Tree有效挖掘最大频繁项集[J].软件学报,2005,16(2):215-222. 被引量:68
  • 4TOSHIHIRO K, SHINJI K, KATSURO I. CCFinder:A multilinguistic token based code clone detection system for large scale source code[J]. Transactions on Software Engineering,2002,28(7):654-670.
  • 5KARP, RICHARD M. and Michael O. Rabin, Efficient Randomized Pattern-Matching Algorithms[J]. IBM Journal of Research and Development, 31 (2): 249-260.
  • 6MICHAEL J. WISE. String similarity via greedy string tiling and running Karp-Rabin matching[J/OL], ftp://ftp.cs.su.oz.au/ michaelw/doc/RKR GST.ps, Dept. of CS, University of Sydney, December 1993.
  • 7WISE MJ. YAP3: Improved detection of similarities in computer programs and other texts[J/OL]. In: Proceedings of the SIGCSE'96. 1996, 130-134. http://citeseer.nj.nee.com/wise96yap.html.
  • 8PRECHELT L, MALPOHL G, PHILIPPSEN M. Finding plagiarism among a set of programs with Jplag[J]. Journal of Universal Computer Science, 2002,8(11):1016-1038.
  • 9Irvine V C, Samir Khuller. Design and Analysis of Algorithms Lecture Notes [R]. Dept. of Computer Science, University of Maryland, 2003.
  • 10Michael J Wise. String Similarity Via Greedy String Tiling and Running Karp - Rabin Matching [ D]. Sydney: Uni- versity of Sydney, 1993.

共引文献110

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部