메뉴 건너뛰기




Volumn 65, Issue 1, 2007, Pages 17-28

The usability of passphrases for authentication: An empirical field study

Author keywords

Authentication; Memory; Passphrases; Passwords; Security; Usability

Indexed keywords

BIT ERROR RATE; COMPUTER CRIME; MANAGERS; PUBLIC POLICY; SECURITY OF DATA; USER INTERFACES;

EID: 33751168960     PISSN: 10715819     EISSN: 10959300     Source Type: Journal    
DOI: 10.1016/j.ijhcs.2006.08.005     Document Type: Article
Times cited : (98)

References (39)
  • 1
    • 33746633350 scopus 로고
    • Perceived usefulness, ease of use, and usage of information technology: a replication
    • Adams D.A., Nelson R.R., and Todd P.A. Perceived usefulness, ease of use, and usage of information technology: a replication. MIS Quarterly 16 2 (1992) 227-247
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 227-247
    • Adams, D.A.1    Nelson, R.R.2    Todd, P.A.3
  • 3
    • 0013970751 scopus 로고
    • Short-term memory for word sequences as a function of acoustic, semantic, and formal similarity
    • Baddeley A.D. Short-term memory for word sequences as a function of acoustic, semantic, and formal similarity. Quarterly Journal of Experimental Psychology 18 (1966) 362-365
    • (1966) Quarterly Journal of Experimental Psychology , vol.18 , pp. 362-365
    • Baddeley, A.D.1
  • 4
    • 0028411309 scopus 로고
    • The magical number seven: still magical after all these years?
    • Baddeley A.D. The magical number seven: still magical after all these years?. Psychological Review 101 2 (1994) 353-356
    • (1994) Psychological Review , vol.101 , Issue.2 , pp. 353-356
    • Baddeley, A.D.1
  • 6
    • 33644875555 scopus 로고    scopus 로고
    • Long-term memory is the representational basis for semantic verbal short-term memory
    • Cameron K.A., Haarmann H.J., Grafman J., and Ruchkin D.S. Long-term memory is the representational basis for semantic verbal short-term memory. Psychophysiology 42 (2005) 643-653
    • (2005) Psychophysiology , vol.42 , pp. 643-653
    • Cameron, K.A.1    Haarmann, H.J.2    Grafman, J.3    Ruchkin, D.S.4
  • 8
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis F.E. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 3 (1989) 319-340
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.E.1
  • 9
    • 84985765969 scopus 로고
    • Computer graphics as decision aids: directions for research
    • DeSanctis G. Computer graphics as decision aids: directions for research. Decision Sciences 15 4 (1984) 463-488
    • (1984) Decision Sciences , vol.15 , Issue.4 , pp. 463-488
    • DeSanctis, G.1
  • 10
    • 0000600997 scopus 로고
    • Graphical presentation of accounting data for financial forecasting: an empirical investigation
    • DeSanctis G., and Jarvenpaa S.L. Graphical presentation of accounting data for financial forecasting: an empirical investigation. Accounting Organizations and Society 14 5 & 6 (1989) 509-525
    • (1989) Accounting Organizations and Society , vol.14 , Issue.5-6 , pp. 509-525
    • DeSanctis, G.1    Jarvenpaa, S.L.2
  • 12
    • 33751174794 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication 112, 1985. Password Usage, National Institute of Standards and Technology, accessed July 19, 2005, available at 〈http://www.itl.nist.gov/fipspubs/fip112.htm〉.
  • 14
  • 16
    • 7244231192 scopus 로고    scopus 로고
    • Automatic and controlled processing in sentence recall: the role of long-term and working memory
    • Jeffries E., Ralph M.A.L., and Baddeley A.D. Automatic and controlled processing in sentence recall: the role of long-term and working memory. Journal of Memory and Language 51 (2004) 623-643
    • (2004) Journal of Memory and Language , vol.51 , pp. 623-643
    • Jeffries, E.1    Ralph, M.A.L.2    Baddeley, A.D.3
  • 17
    • 33751194470 scopus 로고    scopus 로고
    • Johansson, J., 2004. The great debates: pass phrases vs. passwords. Part 1 of 3, Microsoft TechNet, 〈http://www.microsoft.com/technet/security/secnews/articles/itproviewpoint091004.mspx〉.
  • 19
    • 0034338059 scopus 로고    scopus 로고
    • Learning about information technologies and social change: the contribution of social informatics
    • Kling R. Learning about information technologies and social change: the contribution of social informatics. The Information Society 16 (2000) 217-232
    • (2000) The Information Society , vol.16 , pp. 217-232
    • Kling, R.1
  • 20
    • 33751176315 scopus 로고
    • Easily remembered passphrases-a better approach
    • Kurzban S.A. Easily remembered passphrases-a better approach. ACM SIGSAC Review 3 2-4 (1985) 10-21
    • (1985) ACM SIGSAC Review , vol.3 , Issue.2-4 , pp. 10-21
    • Kurzban, S.A.1
  • 21
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Levenshtein V.I. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics-Doklady 10 (1966) 707-710
    • (1966) Soviet Physics-Doklady , vol.10 , pp. 707-710
    • Levenshtein, V.I.1
  • 22
    • 33751189207 scopus 로고    scopus 로고
    • McGraw, G., Viega, J., 2000. Protecting passwords: Part 2, IBM developerWorks, 〈http://www-128.ibm.com/developerworks/library/s-pass2/index.html#h4〉.
  • 23
    • 39749093168 scopus 로고
    • The magical number seven, plus of minus two: some limits on our capacity for processing information
    • Miller G.A. The magical number seven, plus of minus two: some limits on our capacity for processing information. Psychological Review 63 (1956) 81-97
    • (1956) Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 24
    • 0018543411 scopus 로고
    • Password security: a case history
    • Morris R., and Thompson K. Password security: a case history. Communications of the ACM 22 11 (1979) 594-597
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 25
    • 33751179939 scopus 로고    scopus 로고
    • Novell, 2003. Eliminate security risks-reduce the costs of password management, Novell Nsure Solutions, 〈http://www.novell.com/collateral/4621367/4621367.pdf〉.
  • 26
    • 0016921038 scopus 로고
    • A method for the correction of garbled words based on the Levenshtein metric
    • Okuda T., Tanaka E., and Kasa T. A method for the correction of garbled words based on the Levenshtein metric. IEEE Transactions on Computers 25 2 (1976) 172-178
    • (1976) IEEE Transactions on Computers , vol.25 , Issue.2 , pp. 172-178
    • Okuda, T.1    Tanaka, E.2    Kasa, T.3
  • 27
    • 12244272072 scopus 로고    scopus 로고
    • Word association computer passwords: the effect of formulation techniques on recall and guessing rates
    • Pond R., Podd J., Bunnell J., and Henderson R. Word association computer passwords: the effect of formulation techniques on recall and guessing rates. Computers and Security 19 7 (2000) 645-656
    • (2000) Computers and Security , vol.19 , Issue.7 , pp. 645-656
    • Pond, R.1    Podd, J.2    Bunnell, J.3    Henderson, R.4
  • 28
    • 0019895650 scopus 로고
    • A password extension for improved human factors
    • Porter S.N. A password extension for improved human factors. Computers and Security 1 1 (1982) 54-56
    • (1982) Computers and Security , vol.1 , Issue.1 , pp. 54-56
    • Porter, S.N.1
  • 30
    • 34248138319 scopus 로고
    • Re-examining perceived ease of use and usefulness: a confirmatory factor analysis
    • Segars A.H., and Grover V. Re-examining perceived ease of use and usefulness: a confirmatory factor analysis. MIS Quarterly 17 4 (1993) 517-525
    • (1993) MIS Quarterly , vol.17 , Issue.4 , pp. 517-525
    • Segars, A.H.1    Grover, V.2
  • 31
    • 33751188979 scopus 로고    scopus 로고
    • Shimonski, R., 2002. Hacking techniques. IBM developerWorks, 〈http://www-106.ibm.com/developerworks/library/s-crack/#h1〉.
  • 32
    • 0039068594 scopus 로고
    • Authenticating users by word association
    • Smith S.L. Authenticating users by word association. Computers and Security 6 (1987) 464-470
    • (1987) Computers and Security , vol.6 , pp. 464-470
    • Smith, S.L.1
  • 33
    • 0034185174 scopus 로고    scopus 로고
    • The effects of word co-occurrence on short-term memory: associative links in long-term memory affect short-term memory performance
    • Stuart G., and Hulme C. The effects of word co-occurrence on short-term memory: associative links in long-term memory affect short-term memory performance. Journal of Experimental Psychology: Learning, Memory, and Cognition 26 3 (2000) 798-802
    • (2000) Journal of Experimental Psychology: Learning, Memory, and Cognition , vol.26 , Issue.3 , pp. 798-802
    • Stuart, G.1    Hulme, C.2
  • 35
    • 33751165985 scopus 로고    scopus 로고
    • Wikipedia, 2005. Levenshtein distance, www.wikipedia.org, 〈http://en.wikipedia.org/wiki/Levenshtein_distance〉.
  • 37
    • 0025545602 scopus 로고
    • Cognitive password: the key to easy access control
    • Zviran M., and Haga W.J. Cognitive password: the key to easy access control. Computers and Security 9 8 (1990) 723-736
    • (1990) Computers and Security , vol.9 , Issue.8 , pp. 723-736
    • Zviran, M.1    Haga, W.J.2
  • 38
    • 0003369812 scopus 로고
    • A comparison of password techniques for multilevel authentication mechanisms
    • Zviran M., and Haga W.J. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal 36 3 (1993) 227-237
    • (1993) The Computer Journal , vol.36 , Issue.3 , pp. 227-237
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.