-
1
-
-
0043232732
-
Users are not the enemy
-
December, 1999
-
Adams, A. and Sasse, M.A. (1999), Users are not the enemy, Communications of the ACM, Vol. 42, No. 12. December, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
-
-
Adams, A.1
Sasse, M.A.2
-
4
-
-
0003400257
-
-
M74-244, MITRE Corp. Bedford, MA
-
Bell, D., & LaPadula, L. (1973) Secure Computer Systems: Mathematical Foundations and Model, M74-244, MITRE Corp. Bedford, MA
-
(1973)
Secure Computer Systems: Mathematical Foundations and Model
-
-
Bell, D.1
LaPadula, L.2
-
5
-
-
0003400255
-
Integrity constraints for secure computer systems
-
Tech. Rep. ESD-TR76-372, USAF Electronic Systems Division, Bedford, MA
-
Biba, K. (1977) Integrity Constraints for Secure Computer Systems. Tech. Rep. ESD-TR76-372, USAF Electronic Systems Division, Bedford, MA
-
(1977)
-
-
Biba, K.1
-
6
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
In S. McDonald, Y. Waern & G. Cockton [Eds.]; Springer
-
Brostoff, S. & Sasse, M. A. (2000): Are Passfaces more usable than passwords? A field trial investigation. In S. McDonald, Y. Waern & G. Cockton [Eds.]: People and Computers XIV - Usability Or Else! Proceedings of HCI 2000 (September 5th - 8th, Sunderland, UK), pp. 405-424, Springer
-
(2000)
People and Computers XIV - Usability Or Else! Proceedings of HCI 2000 (September 5th - 8th, Sunderland, UK)
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
7
-
-
0031373072
-
Cognitive, associative and conventional passwords: Recall and guessing rates
-
Bunnell, J., Podd, J., Henderson, R., Napier, R., & Kennedy-Moffat, J. (1997). Cognitive, associative and conventional passwords: Recall and guessing rates. Computers and Security, 16(7), 629-641.
-
(1997)
Computers and Security
, vol.16
, Issue.7
, pp. 629-641
-
-
Bunnell, J.1
Podd, J.2
Henderson, R.3
Napier, R.4
Kennedy-Moffat, J.5
-
10
-
-
0041847762
-
-
FIPS; Federal Information Processing Standards Publication. May 30
-
FIPS (1985) Password Usage. Federal Information Processing Standards Publication. May 30.
-
(1985)
Password Usage
-
-
-
11
-
-
0021481768
-
Pass-algorithms: A user validation scheme based on than knowledge of secret algorithms
-
Haskett, J. A. (1984). Pass-algorithms: a user validation scheme based on than knowledge of secret algorithms. Communications of the ACM, 27(8), 777-781.
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
, pp. 777-781
-
-
Haskett, J.A.1
-
12
-
-
0242528415
-
Personal communication
-
In Reason, J.; Cambridge University Press. Cambridge, UK
-
Hudson, P.T.W. (1988) Personal communication, In Reason, J. (1990) Human Error. Cambridge University Press. Cambridge, UK
-
(1988)
Human Error
-
-
Hudson, P.T.W.1
-
13
-
-
85084161999
-
The design and analysis of graphical passwords
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D. (1999) The Design and Analysis of Graphical Passwords. Proceedings of the 8th USENIX Security Symposium, August 23-26, 1999, Washington, D.C., USA
-
(1999)
Proceedings of the 8th USENIX Security Symposium, August 23-26, 1999, Washington, D.C., USA
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
15
-
-
0242444914
-
-
Laptop tieves usually not after data
-
Lemos, R (2000) Laptop thieves usually not after data. http://www.zdnet.com/zdnn/stories/news/0,4586,2629471,00.html
-
(2000)
-
-
Lemos, R.1
-
16
-
-
0242528417
-
Survivability-a new technical and business perspective on security. New security paradigms workshop
-
Lipson, D. A. and Fisher, H. F. (1999) Survivability-a new technical and business perspective on security. New security paradigms workshop. Proceedings of the 1999 workshop on new security paradigms, September 22 to 24, 1999, Caledonian hills Canada
-
(1999)
Proceedings of the 1999 Workshop on New Security Paradigms, September 22 to 24, 1999, Caledonian Hills Canada
-
-
Lipson, D.A.1
Fisher, H.F.2
-
17
-
-
0242528416
-
Fingerprint authentication
-
(March)
-
Murrer, E. (1999). Fingerprint Authentication. Secure Computing (March) 26-30
-
(1999)
Secure Computing
, pp. 26-30
-
-
Murrer, E.1
-
18
-
-
0023995273
-
Understanding the use of passwords
-
Menkus, B. (1988). Understanding the use of passwords. Computers and Security, 7(2), 132-136.
-
(1988)
Computers and Security
, vol.7
, Issue.2
, pp. 132-136
-
-
Menkus, B.1
-
20
-
-
0004223940
-
-
Cambridge University Press. Cambridge, UK
-
Reason, J. (1990) Human Error. Cambridge University Press. Cambridge, UK
-
(1990)
Human Error
-
-
Reason, J.1
-
21
-
-
0035387175
-
Transforming the 'weakest link': A human-computer interaction approach to usable and effective security
-
Sasse, M. A., Brostoff, S. & Weirich, D. (2001), Transforming the 'weakest link': a human-computer interaction approach to usable and effective security. BT Technical Journal, 19 (3), 122-131. (Also at http://www.bt.com/bttj/)
-
(2001)
BT Technical Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
23
-
-
0028406329
-
Pass sentence - A new approach to computer code
-
Spector, Y., & Ginzberg, J. (1994). Pass sentence - a new approach to computer code. Computers and Security, 13(2), 145-160.
-
(1994)
Computers and Security
, vol.13
, Issue.2
, pp. 145-160
-
-
Spector, Y.1
Ginzberg, J.2
|