-
1
-
-
33746633350
-
Perceived usefulness, ease of use, and usage of information technology: a replication
-
Adams D.A., Nelson R.R., and Todd P.A. Perceived usefulness, ease of use, and usage of information technology: a replication. MIS Quarterly 16 2 (1992) 227-247
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 227-247
-
-
Adams, D.A.1
Nelson, R.R.2
Todd, P.A.3
-
3
-
-
0013970751
-
Short-term memory for word sequences as a function of acoustic, semantic, and formal similarity
-
Baddeley A.D. Short-term memory for word sequences as a function of acoustic, semantic, and formal similarity. Quarterly Journal of Experimental Psychology 18 (1966) 362-365
-
(1966)
Quarterly Journal of Experimental Psychology
, vol.18
, pp. 362-365
-
-
Baddeley, A.D.1
-
4
-
-
0028411309
-
The magical number seven: still magical after all these years?
-
Baddeley A.D. The magical number seven: still magical after all these years?. Psychological Review 101 2 (1994) 353-356
-
(1994)
Psychological Review
, vol.101
, Issue.2
, pp. 353-356
-
-
Baddeley, A.D.1
-
5
-
-
0031373072
-
Cognitive, associative and conventional password: recall and guessing rates
-
Bunnell J., Podd J., Henderson R., Napier R., and Kennedy-Moffat J. Cognitive, associative and conventional password: recall and guessing rates. Computers and Security 16 7 (1997) 645-657
-
(1997)
Computers and Security
, vol.16
, Issue.7
, pp. 645-657
-
-
Bunnell, J.1
Podd, J.2
Henderson, R.3
Napier, R.4
Kennedy-Moffat, J.5
-
6
-
-
33644875555
-
Long-term memory is the representational basis for semantic verbal short-term memory
-
Cameron K.A., Haarmann H.J., Grafman J., and Ruchkin D.S. Long-term memory is the representational basis for semantic verbal short-term memory. Psychophysiology 42 (2005) 643-653
-
(2005)
Psychophysiology
, vol.42
, pp. 643-653
-
-
Cameron, K.A.1
Haarmann, H.J.2
Grafman, J.3
Ruchkin, D.S.4
-
8
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis F.E. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 3 (1989) 319-340
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.E.1
-
9
-
-
84985765969
-
Computer graphics as decision aids: directions for research
-
DeSanctis G. Computer graphics as decision aids: directions for research. Decision Sciences 15 4 (1984) 463-488
-
(1984)
Decision Sciences
, vol.15
, Issue.4
, pp. 463-488
-
-
DeSanctis, G.1
-
10
-
-
0000600997
-
Graphical presentation of accounting data for financial forecasting: an empirical investigation
-
DeSanctis G., and Jarvenpaa S.L. Graphical presentation of accounting data for financial forecasting: an empirical investigation. Accounting Organizations and Society 14 5 & 6 (1989) 509-525
-
(1989)
Accounting Organizations and Society
, vol.14
, Issue.5-6
, pp. 509-525
-
-
DeSanctis, G.1
Jarvenpaa, S.L.2
-
12
-
-
33751174794
-
-
Federal Information Processing Standards Publication 112, 1985. Password Usage, National Institute of Standards and Technology, accessed July 19, 2005, available at 〈http://www.itl.nist.gov/fipspubs/fip112.htm〉.
-
-
-
-
13
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
Gong L., Lomas M.A., Needham R.M., and Saltzer J.H. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications 11 5 (1993) 648-656
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
14
-
-
1642457854
-
Changing passwords
-
Highland J.H. Changing passwords. Computers and Security 16 3 (1997) 183-184
-
(1997)
Computers and Security
, vol.16
, Issue.3
, pp. 183-184
-
-
Highland, J.H.1
-
16
-
-
7244231192
-
Automatic and controlled processing in sentence recall: the role of long-term and working memory
-
Jeffries E., Ralph M.A.L., and Baddeley A.D. Automatic and controlled processing in sentence recall: the role of long-term and working memory. Journal of Memory and Language 51 (2004) 623-643
-
(2004)
Journal of Memory and Language
, vol.51
, pp. 623-643
-
-
Jeffries, E.1
Ralph, M.A.L.2
Baddeley, A.D.3
-
17
-
-
33751194470
-
-
Johansson, J., 2004. The great debates: pass phrases vs. passwords. Part 1 of 3, Microsoft TechNet, 〈http://www.microsoft.com/technet/security/secnews/articles/itproviewpoint091004.mspx〉.
-
-
-
-
19
-
-
0034338059
-
Learning about information technologies and social change: the contribution of social informatics
-
Kling R. Learning about information technologies and social change: the contribution of social informatics. The Information Society 16 (2000) 217-232
-
(2000)
The Information Society
, vol.16
, pp. 217-232
-
-
Kling, R.1
-
20
-
-
33751176315
-
Easily remembered passphrases-a better approach
-
Kurzban S.A. Easily remembered passphrases-a better approach. ACM SIGSAC Review 3 2-4 (1985) 10-21
-
(1985)
ACM SIGSAC Review
, vol.3
, Issue.2-4
, pp. 10-21
-
-
Kurzban, S.A.1
-
21
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein V.I. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics-Doklady 10 (1966) 707-710
-
(1966)
Soviet Physics-Doklady
, vol.10
, pp. 707-710
-
-
Levenshtein, V.I.1
-
22
-
-
33751189207
-
-
McGraw, G., Viega, J., 2000. Protecting passwords: Part 2, IBM developerWorks, 〈http://www-128.ibm.com/developerworks/library/s-pass2/index.html#h4〉.
-
-
-
-
23
-
-
39749093168
-
The magical number seven, plus of minus two: some limits on our capacity for processing information
-
Miller G.A. The magical number seven, plus of minus two: some limits on our capacity for processing information. Psychological Review 63 (1956) 81-97
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
24
-
-
0018543411
-
Password security: a case history
-
Morris R., and Thompson K. Password security: a case history. Communications of the ACM 22 11 (1979) 594-597
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
25
-
-
33751179939
-
-
Novell, 2003. Eliminate security risks-reduce the costs of password management, Novell Nsure Solutions, 〈http://www.novell.com/collateral/4621367/4621367.pdf〉.
-
-
-
-
26
-
-
0016921038
-
A method for the correction of garbled words based on the Levenshtein metric
-
Okuda T., Tanaka E., and Kasa T. A method for the correction of garbled words based on the Levenshtein metric. IEEE Transactions on Computers 25 2 (1976) 172-178
-
(1976)
IEEE Transactions on Computers
, vol.25
, Issue.2
, pp. 172-178
-
-
Okuda, T.1
Tanaka, E.2
Kasa, T.3
-
27
-
-
12244272072
-
Word association computer passwords: the effect of formulation techniques on recall and guessing rates
-
Pond R., Podd J., Bunnell J., and Henderson R. Word association computer passwords: the effect of formulation techniques on recall and guessing rates. Computers and Security 19 7 (2000) 645-656
-
(2000)
Computers and Security
, vol.19
, Issue.7
, pp. 645-656
-
-
Pond, R.1
Podd, J.2
Bunnell, J.3
Henderson, R.4
-
28
-
-
0019895650
-
A password extension for improved human factors
-
Porter S.N. A password extension for improved human factors. Computers and Security 1 1 (1982) 54-56
-
(1982)
Computers and Security
, vol.1
, Issue.1
, pp. 54-56
-
-
Porter, S.N.1
-
30
-
-
34248138319
-
Re-examining perceived ease of use and usefulness: a confirmatory factor analysis
-
Segars A.H., and Grover V. Re-examining perceived ease of use and usefulness: a confirmatory factor analysis. MIS Quarterly 17 4 (1993) 517-525
-
(1993)
MIS Quarterly
, vol.17
, Issue.4
, pp. 517-525
-
-
Segars, A.H.1
Grover, V.2
-
31
-
-
33751188979
-
-
Shimonski, R., 2002. Hacking techniques. IBM developerWorks, 〈http://www-106.ibm.com/developerworks/library/s-crack/#h1〉.
-
-
-
-
32
-
-
0039068594
-
Authenticating users by word association
-
Smith S.L. Authenticating users by word association. Computers and Security 6 (1987) 464-470
-
(1987)
Computers and Security
, vol.6
, pp. 464-470
-
-
Smith, S.L.1
-
33
-
-
0034185174
-
The effects of word co-occurrence on short-term memory: associative links in long-term memory affect short-term memory performance
-
Stuart G., and Hulme C. The effects of word co-occurrence on short-term memory: associative links in long-term memory affect short-term memory performance. Journal of Experimental Psychology: Learning, Memory, and Cognition 26 3 (2000) 798-802
-
(2000)
Journal of Experimental Psychology: Learning, Memory, and Cognition
, vol.26
, Issue.3
, pp. 798-802
-
-
Stuart, G.1
Hulme, C.2
-
35
-
-
33751165985
-
-
Wikipedia, 2005. Levenshtein distance, www.wikipedia.org, 〈http://en.wikipedia.org/wiki/Levenshtein_distance〉.
-
-
-
-
36
-
-
12844275960
-
Password memorability and security: empirical results
-
Yan J., Blackwell A., Anderson R., and Grant A. Password memorability and security: empirical results. IEEE Security and Privacy 2 5 (2004) 25-31
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
37
-
-
0025545602
-
Cognitive password: the key to easy access control
-
Zviran M., and Haga W.J. Cognitive password: the key to easy access control. Computers and Security 9 8 (1990) 723-736
-
(1990)
Computers and Security
, vol.9
, Issue.8
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
-
38
-
-
0003369812
-
A comparison of password techniques for multilevel authentication mechanisms
-
Zviran M., and Haga W.J. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal 36 3 (1993) 227-237
-
(1993)
The Computer Journal
, vol.36
, Issue.3
, pp. 227-237
-
-
Zviran, M.1
Haga, W.J.2
|