{"id":"https://openalex.org/W2116830621","doi":"https://doi.org/10.1109/icmlc.2011.6016851","title":"A universal distributed model for password cracking","display_name":"A universal distributed model for password cracking","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2116830621","doi":"https://doi.org/10.1109/icmlc.2011.6016851","mag":"2116830621"},"language":"en","primary_location":{"id":"doi:10.1109/icmlc.2011.6016851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmlc.2011.6016851","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Machine Learning and Cybernetics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101810085","display_name":"Jing Zou","orcid":"https://orcid.org/0000-0002-8098-7284"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Zou","raw_affiliation_strings":["Chinese Academy of Sciences, Beijing, Beijing, CN","SKLOIS Lab, Institute of Software, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Beijing, Beijing, CN","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"SKLOIS Lab, Institute of Software, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008820992","display_name":"Dongdai Lin","orcid":"https://orcid.org/0000-0002-3951-7889"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong-Dai Lin","raw_affiliation_strings":["SKLOIS Laboratory, Institute of Software, Chinese Academy and Sciences, China","SKLOIS Lab, Institute of Software, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"SKLOIS Laboratory, Institute of Software, Chinese Academy and Sciences, China","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"SKLOIS Lab, Institute of Software, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084060011","display_name":"Guo-Cui Mi","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guo-Cui Mi","raw_affiliation_strings":["Chinese Academy of Sciences, Beijing, Beijing, CN","SKLOIS Lab, Institute of Software, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Beijing, Beijing, CN","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"SKLOIS Lab, Institute of Software, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101810085"],"corresponding_institution_ids":["https://openalex.org/I19820366"],"apc_list":null,"apc_paid":null,"fwci":0.9187,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74895203,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"28","issue":null,"first_page":"955","last_page":"960"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8234609961509705},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7705546617507935},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.6110484004020691},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.573881983757019},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5263969898223877},{"id":"https://openalex.org/keywords/linear-subspace","display_name":"Linear subspace","score":0.4998941421508789},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.4735756814479828},{"id":"https://openalex.org/keywords/partition","display_name":"Partition (number theory)","score":0.46956300735473633},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.46312814950942993},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.36748817563056946},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.2693813741207123},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26405301690101624},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2494525909423828},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.2098046839237213},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17504391074180603},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.07792097330093384}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8234609961509705},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7705546617507935},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.6110484004020691},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.573881983757019},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5263969898223877},{"id":"https://openalex.org/C12362212","wikidata":"https://www.wikidata.org/wiki/Q728435","display_name":"Linear subspace","level":2,"score":0.4998941421508789},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.4735756814479828},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.46956300735473633},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46312814950942993},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36748817563056946},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.2693813741207123},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26405301690101624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2494525909423828},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.2098046839237213},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17504391074180603},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.07792097330093384},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icmlc.2011.6016851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmlc.2011.6016851","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Machine Learning and Cybernetics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2012646342","https://openalex.org/W2064327548","https://openalex.org/W2086553822"],"related_works":["https://openalex.org/W2555472429","https://openalex.org/W2811066956","https://openalex.org/W2097945858","https://openalex.org/W4239831152","https://openalex.org/W1607548261","https://openalex.org/W2546293360","https://openalex.org/W3006470114","https://openalex.org/W2982121152","https://openalex.org/W2215280468","https://openalex.org/W4312630426"],"abstract_inverted_index":{"Due":[0],"to":[1,13,19,40],"the":[2,29,42,52,58,67,73,83,101,107,110],"parallel":[3,15],"nature":[4],"of":[5,54,69,75,99,112,137],"brute":[6],"force":[7],"attack,":[8],"it":[9,37,120],"is":[10,38,49,57,128],"well":[11],"suited":[12],"use":[14],"or":[16,35],"distributed":[17,93],"computing":[18],"recover":[20],"passwords":[21,70],"encrypted":[22],"by":[23],"one-way":[24],"hash":[25],"functions.":[26],"When":[27],"distributing":[28],"password":[30,96],"cracking":[31,97],"task":[32],"between":[33],"threads":[34],"nodes,":[36],"necessary":[39],"divide":[41],"search":[43,84,102],"space":[44,85,103],"into":[45],"several":[46],"subspaces.":[47],"It":[48],"ideal":[50],"that":[51],"size":[53],"these":[55],"subspaces":[56],"same":[59],"for":[60,82,95],"a":[61,91,113,135],"load":[62],"balanced":[63],"solution.":[64],"However,":[65],"increasing":[66],"length":[68],"will":[71,79],"raise":[72],"number":[74],"combinations":[76],"exponentially.":[77],"This":[78,88],"raises":[80],"issues":[81],"uniform":[86],"partition.":[87],"paper":[89,108],"presents":[90],"universal":[92],"model":[94,127],"capable":[98],"dividing":[100],"evenly.":[104],"For":[105],"this,":[106],"addresses":[109],"definition":[111],"base-n-like":[114],"number,":[115],"and":[116,121,133],"discusses":[117],"operations":[118],"on":[119],"relations":[122],"with":[123],"base-n":[124],"number.":[125],"The":[126],"data":[129],"independent,":[130],"easily":[131],"implemented":[132],"needs":[134],"few":[136],"communications.":[138],"Experimental":[139],"results":[140],"are":[141],"then":[142],"shown.":[143]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
