D. V. Klein, RY-t/FB Omen 4G : RY-t/MS JtR-Markov: RY-t/RY-e JtR-Markov: RY-t/FB JtR-Markov: RY-t/MS References 1 Improving system security via proactive password checking, CDF cracked password Omen 4G, pp.233-249, 1995.

J. Bonneau, The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.49

J. Bonneau, C. Herley, P. C. Van-oorschot, and F. Stajano, The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.44

W. E. Burr, D. F. Dodson, and W. T. Polk, Electronic authentication guideline: NIST special publication, pp.800-63, 2006.

C. Castelluccia, M. Dürmuth, and D. Perito, Adaptive password-strength meters from Markov models, Proc. Network and Distributed Systems Security Symposium (NDSS), 2012.
URL : https://hal.archives-ouvertes.fr/hal-00747824

M. Dell-'amico, P. Michiardi, and Y. Roudier, Password strength: an empirical analysis, Proc. 29th conference on Information communications, INFOCOM'10, pp.983-991, 2010.

S. Egelman, J. Bonneau, S. Chiasson, D. Dittrich, and S. Schechter, It???s Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin, Financial Cryptography and Data Security, 2012.
DOI : 10.1007/978-3-642-34638-5_11

G. Kedem and Y. Ishihara, Brute force attack on unix passwords with SIMD computer, Proc. 8th conference on USENIX Security Symposium SSYM'99. USENIX Association, 1999.

P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas et al., Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.38

D. V. Klein, Foiling the cracker: A survey of, and improvements to, password security, Proc. USENIX UNIX Security Workshop, 1990.

S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer et al., Of passwords and people, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, 2011.
DOI : 10.1145/1978942.1979321

Z. Li, W. Han, and W. Xu, A large-scale empirical analysis of chinese web passwords, Proc. 23rd USENIX Security Symposium (USENIX Security), 2014.

J. Ma, W. Yang, M. Luo, and N. Li, A Study of Probabilistic Password Models, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.50

R. Morris and K. Thompson, Password security: a case history, Communications of the ACM, vol.22, issue.11, pp.594-597, 1979.
DOI : 10.1145/359168.359172

A. Narayanan and V. Shmatikov, Fast dictionary attacks on passwords using timespace tradeoff, Proc. 12th ACM conference on Computer and communications security (CCS), pp.364-372, 2005.

N. Provos and D. Mazières, A future-adaptive password scheme, Proc. Annual conference on USENIX Annual Technical Conference, ATEC '99. USENIX Association, 1999.

S. Schechter, C. Herley, and M. Mitzenmacher, Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks, Proc. 5th USENIX conference on Hot topics in security, pp.1-8, 2010.

E. H. Spafford, Observing reusable password choices, Proc. 3rd Security Symposium, pp.299-312, 1992.

M. Weir, S. Aggarwal, M. Collins, and H. Stern, Testing metrics for password creation policies by attacking large sets of revealed passwords, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.162-175, 2010.
DOI : 10.1145/1866307.1866327

M. Weir, S. Aggarwal, B. De-medeiros, and B. Glodek, Password Cracking Using Probabilistic Context-Free Grammars, 2009 30th IEEE Symposium on Security and Privacy, pp.391-405, 2009.
DOI : 10.1109/SP.2009.8