An Epistemological Approach to Steganography, Lecture Notes in Computer Science, vol.29, pp.15-30, 2009. ,
DOI : 10.1007/978-3-540-77370-2_22
Kamouflage: Loss-Resistant Password Management, European Symposium on Research in Computer Security (ESORICS), pp.286-302, 2010. ,
DOI : 10.1007/978-3-642-15497-3_18
URL : http://bojinov.org/professional/esorics2010-kamouflage.pdf
Guessing human-chosen secrets, 2012. ,
An Information-Theoretic Model for Steganography, Lecture Notes in Computer Science, vol.1525, pp.306-318, 1998. ,
DOI : 10.1007/3-540-39568-7_32
Cracking-Resistant Password Vaults Using Natural Language Encoders, 2015 IEEE Symposium on Security and Privacy, pp.481-498, 2016. ,
DOI : 10.1109/SP.2015.36
URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7163043
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.920-935, 2011. ,
DOI : 10.1109/TIFS.2011.2134094
URL : http://dde.binghamton.edu/filler/pdf/Fill10tifs-stc.pdf
A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.656-666, 2007. ,
DOI : 10.1145/1242572.1242661
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, pp.67-81, 2005. ,
DOI : 10.1007/978-3-540-30114-1_6
Steganography in Digital Media: Principles, Algorithms, and Applications, 2009. ,
DOI : 10.1017/CBO9781139192903
On the Security of Cracking-Resistant Password Vaults, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1230-1241, 2016. ,
DOI : 10.1109/ReConFig.2014.7032529
Honey Encryption: Encryption beyond the Brute-Force Barrier, Advances in Cryptology -EUROCRYPT, pp.293-310, 2014. ,
DOI : 10.1109/MSP.2014.67
PKCS# 5: Password-based cryptography specification version 2.0, RFC, vol.2289, 2000. ,
DOI : 10.17487/rfc2898
The emperor's new password manager: security analysis of web-based password managers, USENIX Security Symposium, pp.465-479, 2014. ,
DOI : 10.21236/ADA614474
A unified and generalized treatment of authentication theory, 13th Annual Symposium on Theoretical Aspects of Computer Science, pp.387-398, 1996. ,
DOI : 10.1007/3-540-60922-9_32
Model-Based Steganography, Digital Watermarking, pp.254-260, 2004. ,
DOI : 10.1007/978-3-540-24624-4_12
Password managers: attacks and defenses, USENIX Security Symposium, pp.449-464, 2014. ,
MIMIC FUNCTIONS, Cryptologia, vol.16, issue.3, pp.193-214, 1992. ,
DOI : 10.1080/0161-119291866883