-
1
-
-
0023328831
-
Verifying the authentication of an information system user
-
N. Ahituv, Y. Lapid, and S. Neumann, Verifying the authentication of an information system user, Computers & Security, 6 (1987) 152-157.
-
(1987)
Computers & Security
, vol.6
, pp. 152-157
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
2
-
-
0024771499
-
A survey of password mechanisms: Weaknesses and potential improvements. Part 1
-
D. L. Jobusch and A. E. Oldehoeft, A survey of password mechanisms: Weaknesses and potential improvements. Part 1, Computers & Security, 8 (1989a) 587-604.
-
(1989)
Computers & Security
, vol.8
, pp. 587-604
-
-
Jobusch, D.L.1
Oldehoeft, A.E.2
-
3
-
-
0023995273
-
Understanding the use of passwords
-
B. Menkus, Understanding the use of passwords, Computers & Security, 7 (1988) 132-136.
-
(1988)
Computers & Security
, vol.7
, pp. 132-136
-
-
Menkus, B.1
-
4
-
-
0024768109
-
Passwords in use in a university timesharing environment
-
B. L. Riddle, M. S. Miron, and J. A. Semo, Passwords in use in a university timesharing environment, Computers & Security, 8 (1989) 569-579.
-
(1989)
Computers & Security
, vol.8
, pp. 569-579
-
-
Riddle, B.L.1
Miron, M.S.2
Semo, J.A.3
-
5
-
-
0039068594
-
Authenticating users by word association
-
S. L. Smith, Authenticating users by word association, Computers & Security, 6 (1987) 464-470.
-
(1987)
Computers & Security
, vol.6
, pp. 464-470
-
-
Smith, S.L.1
-
6
-
-
0028406329
-
Pass-sentence - A new approach to computer code
-
Y. Spector and J. Ginzberg, Pass-sentence - a new approach to computer code, Computers & Security, 13 (1994) 145-160.
-
(1994)
Computers & Security
, vol.13
, pp. 145-160
-
-
Spector, Y.1
Ginzberg, J.2
-
7
-
-
0024777503
-
A survey of password mechanisms: Weaknesses and potential improvements. Part 2
-
D. L. Jobusch and A. E. Oldehoeft, A survey of password mechanisms: Weaknesses and potential improvements. Part 2, Computers & Security, 8 (1989b) 675- 689.
-
(1989)
Computers & Security
, vol.8
, pp. 675-689
-
-
Jobusch, D.L.1
Oldehoeft, A.E.2
-
8
-
-
0019895650
-
A password extension for improved human factors
-
S. N. Porter, A password extension for improved human factors, Computers & Security, 1 (1982) 5456.
-
(1982)
Computers & Security
, vol.1
, pp. 5456
-
-
Porter, S.N.1
-
9
-
-
0020925461
-
A dozen gross 'mythconceptions' about information processing security
-
V. Fak, (Ed.), Holland, North Holland Publishing Co.
-
S. Kurzban, A dozen gross 'mythconceptions' about information processing security, In V. Fak, (Ed.), In Security, IFIP/Sec '83. (pp. 15-25), Holland, North Holland Publishing Co., 1983.
-
(1983)
Security, IFIP/Sec '83
, pp. 15-25
-
-
Kurzban, S.1
-
11
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop and D. V. Klein, Improving system security via proactive password checking, Computers & Security, 14 (1995) 233-249.
-
(1995)
Computers & Security
, vol.14
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
12
-
-
0031373072
-
Cognitive, associative, and conventional passwords: Recall and guessing rates
-
J. Bunnell, J. Podd, R. Henderson, R. Napier, and J. Kennedy-Moffat, Cognitive, associative, and conventional passwords: Recall and guessing rates, Computers & Security, 16 (1997) 645-657.
-
(1997)
Computers & Security
, vol.16
, pp. 645-657
-
-
Bunnell, J.1
Podd, J.2
Henderson, R.3
Napier, R.4
Kennedy-Moffat, J.5
-
13
-
-
0003369812
-
A comparison of password techniques for multilevel authentication mechanisms
-
M. Zviran and WJ. Haga, A comparison of password techniques for multilevel authentication mechanisms, The Computer Journal, 36 (1993) 227-237.
-
(1993)
The Computer Journal
, vol.36
, pp. 227-237
-
-
Zviran, M.1
Haga, W.J.2
-
14
-
-
0025545602
-
Cognitive passwords: The key to easy access control
-
M. Zviran and W J. Haga, Cognitive passwords: The key to easy access control, Computers & Security, 9 (1990) 723-736.
-
(1990)
Computers & Security
, vol.9
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
-
17
-
-
0002602697
-
GPOWER: A general power analysis program
-
E. Erdfelder, F. Faul, and A. Buchner, GPOWER: a general power analysis program, Behaviour Research Methods, Instruments, & Computers, 28 (1996) 1-11.
-
(1996)
Behaviour Research Methods, Instruments, & Computers
, vol.28
, pp. 1-11
-
-
Erdfelder, E.1
Faul, F.2
Buchner, A.3
-
18
-
-
0021939027
-
On improvements to password security
-
K. Smgh, On improvements to password security, Operation Systems Review, 19 (1985) 53-60.
-
(1985)
Operation Systems Review
, vol.19
, pp. 53-60
-
-
Smgh, K.1
|