메뉴 건너뛰기




Volumn 19, Issue 7, 2000, Pages 645-656

Word association computer passwords: The effect of formulation techniques on recall and guessing rates

Author keywords

Guessing rate; Password security; Recall rate; Word associations

Indexed keywords


EID: 12244272072     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(00)07023-1     Document Type: Note
Times cited : (30)

References (18)
  • 1
    • 0023328831 scopus 로고
    • Verifying the authentication of an information system user
    • N. Ahituv, Y. Lapid, and S. Neumann, Verifying the authentication of an information system user, Computers & Security, 6 (1987) 152-157.
    • (1987) Computers & Security , vol.6 , pp. 152-157
    • Ahituv, N.1    Lapid, Y.2    Neumann, S.3
  • 2
    • 0024771499 scopus 로고
    • A survey of password mechanisms: Weaknesses and potential improvements. Part 1
    • D. L. Jobusch and A. E. Oldehoeft, A survey of password mechanisms: Weaknesses and potential improvements. Part 1, Computers & Security, 8 (1989a) 587-604.
    • (1989) Computers & Security , vol.8 , pp. 587-604
    • Jobusch, D.L.1    Oldehoeft, A.E.2
  • 3
    • 0023995273 scopus 로고
    • Understanding the use of passwords
    • B. Menkus, Understanding the use of passwords, Computers & Security, 7 (1988) 132-136.
    • (1988) Computers & Security , vol.7 , pp. 132-136
    • Menkus, B.1
  • 4
    • 0024768109 scopus 로고
    • Passwords in use in a university timesharing environment
    • B. L. Riddle, M. S. Miron, and J. A. Semo, Passwords in use in a university timesharing environment, Computers & Security, 8 (1989) 569-579.
    • (1989) Computers & Security , vol.8 , pp. 569-579
    • Riddle, B.L.1    Miron, M.S.2    Semo, J.A.3
  • 5
    • 0039068594 scopus 로고
    • Authenticating users by word association
    • S. L. Smith, Authenticating users by word association, Computers & Security, 6 (1987) 464-470.
    • (1987) Computers & Security , vol.6 , pp. 464-470
    • Smith, S.L.1
  • 6
    • 0028406329 scopus 로고
    • Pass-sentence - A new approach to computer code
    • Y. Spector and J. Ginzberg, Pass-sentence - a new approach to computer code, Computers & Security, 13 (1994) 145-160.
    • (1994) Computers & Security , vol.13 , pp. 145-160
    • Spector, Y.1    Ginzberg, J.2
  • 7
    • 0024777503 scopus 로고
    • A survey of password mechanisms: Weaknesses and potential improvements. Part 2
    • D. L. Jobusch and A. E. Oldehoeft, A survey of password mechanisms: Weaknesses and potential improvements. Part 2, Computers & Security, 8 (1989b) 675- 689.
    • (1989) Computers & Security , vol.8 , pp. 675-689
    • Jobusch, D.L.1    Oldehoeft, A.E.2
  • 8
    • 0019895650 scopus 로고
    • A password extension for improved human factors
    • S. N. Porter, A password extension for improved human factors, Computers & Security, 1 (1982) 5456.
    • (1982) Computers & Security , vol.1 , pp. 5456
    • Porter, S.N.1
  • 9
    • 0020925461 scopus 로고
    • A dozen gross 'mythconceptions' about information processing security
    • V. Fak, (Ed.), Holland, North Holland Publishing Co.
    • S. Kurzban, A dozen gross 'mythconceptions' about information processing security, In V. Fak, (Ed.), In Security, IFIP/Sec '83. (pp. 15-25), Holland, North Holland Publishing Co., 1983.
    • (1983) Security, IFIP/Sec '83 , pp. 15-25
    • Kurzban, S.1
  • 11
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop and D. V. Klein, Improving system security via proactive password checking, Computers & Security, 14 (1995) 233-249.
    • (1995) Computers & Security , vol.14 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 13
    • 0003369812 scopus 로고
    • A comparison of password techniques for multilevel authentication mechanisms
    • M. Zviran and WJ. Haga, A comparison of password techniques for multilevel authentication mechanisms, The Computer Journal, 36 (1993) 227-237.
    • (1993) The Computer Journal , vol.36 , pp. 227-237
    • Zviran, M.1    Haga, W.J.2
  • 14
    • 0025545602 scopus 로고
    • Cognitive passwords: The key to easy access control
    • M. Zviran and W J. Haga, Cognitive passwords: The key to easy access control, Computers & Security, 9 (1990) 723-736.
    • (1990) Computers & Security , vol.9 , pp. 723-736
    • Zviran, M.1    Haga, W.J.2
  • 18
    • 0021939027 scopus 로고
    • On improvements to password security
    • K. Smgh, On improvements to password security, Operation Systems Review, 19 (1985) 53-60.
    • (1985) Operation Systems Review , vol.19 , pp. 53-60
    • Smgh, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.