-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A. and Sasse, M.A. Users are not the enemy. CACM 42, 12 (1999), 41-46.
-
(1999)
CACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
0003429117
-
Are Passfaces more usable than passwords: A field trial investigation
-
McDonald S, et al, Eds, Springer
-
Brostoff, S. and Sasse, M.A. Are Passfaces more usable than passwords: A field trial investigation. In McDonald S., et al. (Eds.), People and Computers XIV - Usability or Else, Proc. of HCI2000, Springer, 2000, 405-424.
-
(2000)
People and Computers XIV - Usability or Else, Proc. of HCI2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
3
-
-
7744227917
-
Generating and remembering passwords
-
Brown, A.S., Bracken, E., Zoccoli, S. and Douglas, K. Generating and remembering passwords. Applied Cognitive Psychology, 18, (2004), 641-651.
-
(2004)
Applied Cognitive Psychology
, vol.18
, pp. 641-651
-
-
Brown, A.S.1
Bracken, E.2
Zoccoli, S.3
Douglas, K.4
-
4
-
-
85084162383
-
On user choice in graphical password schemes
-
San Diego
-
Davis, D., Monrose, F., and Reiter, M.K. On user choice in graphical password schemes. In Proc. of the 13th USENIX Security Symposium, San Diego, 2004.
-
(2004)
Proc. of the 13th USENIX Security Symposium
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
5
-
-
0037668484
-
VIP: A visual approach to user authentication
-
ACM Press, NY
-
De Angeli, A., Coutts, M., Coventry, L., Cameron, D., Johnson, G.I., and Fischer, M. VIP: A visual approach to user authentication. In Proc. of AVI 2002, ACM Press, NY, 2002, 316-323.
-
(2002)
Proc. of AVI 2002
, pp. 316-323
-
-
De Angeli, A.1
Coutts, M.2
Coventry, L.3
Cameron, D.4
Johnson, G.I.5
Fischer, M.6
-
6
-
-
19944372131
-
Is a picture worth a thousand words? Exploring the feasibility of graphical authentication systems
-
De Angeli, A., Coventry, L., Johnson, G., and Renaud, K. Is a picture worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63, 1-2 (2005), 128-152.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 128-152
-
-
De Angeli, A.1
Coventry, L.2
Johnson, G.3
Renaud, K.4
-
8
-
-
19944377355
-
Hash visualization in user authentication
-
ACM Press, NY
-
Dhamija, R. Hash visualization in user authentication. In Proc. of CHI 2000, ACM Press, NY, 2002, 279-280.
-
(2002)
Proc. of CHI 2000
, pp. 279-280
-
-
Dhamija, R.1
-
10
-
-
0003532271
-
UNIX password security -ten years later
-
Advances in Cryptography, CRYPTO '89, Springer-Verlag
-
Feldmeier, D. C. and Kam, P. R. UNIX password security -ten years later. In Advances in Cryptography - CRYPTO '89, Lecture Notes in Computer Science 435, Springer-Verlag 1990, 44-63.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 44-63
-
-
Feldmeier, D.C.1
Kam, P.R.2
-
11
-
-
4243096135
-
The domino effect of password reuse
-
Ives, B., Walsh, K. R., and Schneider, H. 2004. The domino effect of password reuse. CACM, 47,4 (2004), 76-78.
-
(2004)
CACM
, vol.47
, Issue.4
, pp. 76-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
12
-
-
85108865018
-
Intrinsic motivation and instructional effectiveness in computer-based education
-
R. E. Snow and M. J. Farr Eds, Lawrence Erlbaum, Hillsdale, NJ
-
Lepper, M.R. and Malone, T.W. Intrinsic motivation and instructional effectiveness in computer-based education. In R. E. Snow and M. J. Farr (Eds.), Aptitude, Learning, and Instruction, Lawrence Erlbaum, Hillsdale, NJ, 1987, 255-286.
-
(1987)
Aptitude, Learning, and Instruction
, pp. 255-286
-
-
Lepper, M.R.1
Malone, T.W.2
-
13
-
-
0018543411
-
Password security: A case study
-
Morris, R. and Thompson, K. Password security: A case study. CACM, 22, (1979), 594-597.
-
(1979)
CACM
, vol.22
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
15
-
-
14844314151
-
PIN-entry method resilient against shoulder-surfing
-
Roth, V., Richter, K., and Freidinger, R. A PIN-entry method resilient against shoulder-surfing. Proc. of the 11th ACM Conference on Computer and Communications Security, 2004, 236-245.
-
(2004)
Proc. of the 11th ACM Conference on Computer and Communications Security
, pp. 236-245
-
-
Roth, V.1
Richter, K.2
Freidinger, R.A.3
-
17
-
-
0035387175
-
Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
-
Sasse, M. A., Brostoff, S. and Weirich, D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technical Journal, 19, (2001), 122-131.
-
(2001)
BT Technical Journal
, vol.19
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
19
-
-
7544243600
-
Graphical passwords
-
Sept
-
Sobrado, L. and Birget, J.C. Graphical passwords. The Rutgers Scholar, 4, (Sept. 2002). http://RutgersScholar.rutgers.edu/volume04/sobrbirg/sobrbirg.htm.
-
(2002)
The Rutgers Scholar
, vol.4
-
-
Sobrado, L.1
Birget, J.C.2
-
21
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., and Memon, N. PassPoints: design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63, (2005), 102-127
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
|