-
1
-
-
0043232732
-
Users are not the enemy
-
A. Addams and M. A. Sasse. "Users are not the enemy," In Communications of the ACM, Volume 42, Issue 12, 1999, pages 40-46.
-
(1999)
In Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Addams, A.1
Sasse, M.A.2
-
4
-
-
12244260624
-
Graphical password
-
US Patent 5559961, Lucent Technologies, Inc, Murray Hill, NJ, August 30, 1995
-
G. E. Blonder. "Graphical password." US Patent 5559961, Lucent Technologies, Inc., Murray Hill, NJ, August 30, 1995.
-
-
-
Blonder, G.E.1
-
5
-
-
0000961352
-
Analysis of a mnemonic device
-
G. H. Bower, "Analysis of a mnemonic device," In American Scientist, 58, 496-510.
-
American Scientist
, vol.58
, pp. 496-510
-
-
Bower, G.H.1
-
9
-
-
12844271985
-
Physiognomic Access Control
-
H. Davies. "Physiognomic Access Control," Information Security Monitor, vol. 10m no. 3, 1995m pp 5-8.
-
(1995)
Information Security Monitor
, vol.10 m
, Issue.3
, pp. 5-8
-
-
Davies, H.1
-
10
-
-
85084162383
-
-
D. Davis, F. Monrose and M. K. Reiter, On User Choice in Graphical Password Schemes, In Proceedings of the 13th UNIX Security Symposium, August 2004.
-
D. Davis, F. Monrose and M. K. Reiter, "On User Choice in Graphical Password Schemes," In Proceedings of the 13th UNIX Security Symposium, August 2004.
-
-
-
-
11
-
-
85084161493
-
-
R. Dhamija and A. Perrig. Deja Vu - A User Study: Using Images for Authentication, In Proceedings of the 9th UNIX Security Symposium, August 2000.
-
R. Dhamija and A. Perrig. "Deja Vu - A User Study: Using Images for Authentication," In Proceedings of the 9th UNIX Security Symposium, August 2000.
-
-
-
-
12
-
-
85084161999
-
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter and A. Rubin. The Design and Analysis of Graphical Passwords, In Proceedings of the 8th UNIX Security Symposium, August 1999.
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter and A. Rubin. "The Design and Analysis of Graphical Passwords," In Proceedings of the 8th UNIX Security Symposium, August 1999.
-
-
-
-
13
-
-
33846290116
-
-
D. Klein. Foiling the cracker: A survey of, and improvements to, password security, In Proceedings of the 2nd USENIX Security Workshop, August 1990.
-
D. Klein. "Foiling the cracker: A survey of, and improvements to, password security," In Proceedings of the 2nd USENIX Security Workshop, August 1990.
-
-
-
-
15
-
-
0006418398
-
TALE-SPIN and Micro TALE-SPIN
-
Roger C. Schank and Christopher K. Riesbeck Eds, Hillsdale, NJ: Erlbaum
-
J. Meehan. "TALE-SPIN and Micro TALE-SPIN." In Roger C. Schank and Christopher K. Riesbeck (Eds.), Inside computer understanding. Hillsdale, NJ: Erlbaum, 1981.
-
(1981)
Inside computer understanding
-
-
Meehan, J.1
-
16
-
-
39749093168
-
The Magical Number Seven, Plus or Minus Two
-
G.A. Miller. "The Magical Number Seven, Plus or Minus Two." Psychological Review, vol. 63, 1956, pages 81-87.
-
(1956)
Psychological Review
, vol.63
, pp. 81-87
-
-
Miller, G.A.1
-
17
-
-
0018543411
-
Password security: A case history
-
November
-
R. Morris and K. Thompson. "Password security: A case history," Communications of the ACM, 22(11):594 597, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
18
-
-
19944389068
-
Picture superiority effect
-
D. L. Nelson, U. S. Reed, and J. R. Walling. "Picture superiority effect," Journal of Experimental Psychology: Human Learning and Memory, 3:485 497, 1977.
-
(1977)
Journal of Experimental Psychology: Human Learning and Memory
, vol.3
, pp. 485-497
-
-
Nelson, D.L.1
Reed, U.S.2
Walling, J.R.3
-
21
-
-
33846278165
-
-
Password Generator. Available at: http://www.alphalink.com.au/Sergeb/ easy-toremember-passwords.html
-
Password Generator. Available at: http://www.alphalink.com.au/Sergeb/ easy-toremember-passwords.html
-
-
-
-
22
-
-
33846275660
-
-
Available at
-
Password Generator 2005. Available at: http://www.diplodock.com/Products/ PasswordGenera tor/default.aspx
-
(2005)
Password Generator
-
-
-
23
-
-
33846286654
-
-
PC KIMMO - A morphological parser. Available at: http://www.sil.org/ pckimmo/
-
PC KIMMO - A morphological parser. Available at: http://www.sil.org/ pckimmo/
-
-
-
-
24
-
-
33846319879
-
-
A. Perrig and D. Song. Hash visualization: A new technique to improve real-world security. In Proceedings of the 1999 International Workshop on Crypto-graphic Techniques and E-Commerce (CryTEC '99), 1999.
-
A. Perrig and D. Song. "Hash visualization: A new technique to improve real-world security." In Proceedings of the 1999 International Workshop on Crypto-graphic Techniques and E-Commerce (CryTEC '99), 1999.
-
-
-
-
25
-
-
33846316573
-
-
Personal Communication
-
Personal Communication.
-
-
-
-
26
-
-
33846328904
-
-
Project Gutenberg. Available at
-
Project Gutenberg. Available at: http://www.gutenberg.org/
-
-
-
-
27
-
-
33846269136
-
-
RealPro. Available at: http://www.cogentex.com/technology/realpro/index. sh tml
-
RealPro. Available at: http://www.cogentex.com/technology/realpro/index. sh tml
-
-
-
-
28
-
-
84863436348
-
-
Available at
-
Senseclusters. Available at: http://www.d.umn.edu/tpederse/code.html
-
Senseclusters
-
-
-
29
-
-
33846267864
-
-
E. Spafford. Observing Reusable Password Choices, In Proceedings of the 3rd UNIX Security Symposium, pages 299-312, Berkeley, CA, September 1992. Usenix Association.
-
E. Spafford. "Observing Reusable Password Choices," In Proceedings of the 3rd UNIX Security Symposium, pages 299-312, Berkeley, CA, September 1992. Usenix Association.
-
-
-
-
30
-
-
84872088226
-
-
Available at
-
Stanford Log-linear Tagger. Available at: http://wwwnlp.stanford.edu/ software/tagger.shtml
-
Stanford Log-linear Tagger
-
-
-
31
-
-
33846312655
-
-
Available at
-
The password mnemonic generator. Available at: http://www.aber.ac.uk/ cgibin/user/syswww/gw/mnemonic
-
The password mnemonic generator
-
-
-
32
-
-
33846278816
-
The Science Behind Passfaces
-
Real User Corporation, September
-
The Science Behind Passfaces. Revision 2, Real User Corporation, September 2001. http://www.realuser.com/published/ScienceBehindPa ssfaces.pdf.
-
(2001)
Revision
, vol.2
-
-
-
33
-
-
85084163855
-
-
J. Thorpe and P. C. van Oorschoti. Graphical Dictionaries and the Memorable Space of Graphical Passwords, In Proceedings of the 13th USENIX Security Symposium, 2004.
-
J. Thorpe and P. C. van Oorschoti. "Graphical Dictionaries and the Memorable Space of Graphical Passwords," In Proceedings of the 13th USENIX Security Symposium, 2004.
-
-
-
-
35
-
-
33846300492
-
-
US Dept. of Defense, Password Management Guideline, CSC-STD-002-85, 1985.
-
US Dept. of Defense, "Password Management Guideline," CSC-STD-002-85, 1985.
-
-
-
-
37
-
-
33846267133
-
-
Available at
-
Wordnet. Available at: http://wordnet.princeton.edu/
-
Wordnet
-
-
-
38
-
-
12844275960
-
Password memorability and security: Empirical results
-
Jeff Van, Alan Blackwell, Ross Anderson and Alasdair Grant. "Password memorability and security: empirical results," Security & Privacy Magazine, IEEE, Volume 2, Issue 5, 2004, pages 25-31.
-
(2004)
Security & Privacy Magazine, IEEE
, vol.2
, Issue.5
, pp. 25-31
-
-
Van, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|