-
1
-
-
0043232732
-
Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
-
Adams, A., and Sasse, M.A., 1999. Users are not the enemy: why users compromise security mechanisms and how to take remedial measures. Communications of the ACM 42 (12), 40-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
34250693483
-
-
Australian Computer Emergency Response Team (AusCERT). Choosing good passwords. AusCERT Reference # GoodPasswords, February 1, 2001. http://www.auscert.org.au/render.html?it=2260 (accessed March 2006).
-
Australian Computer Emergency Response Team (AusCERT). Choosing good passwords. AusCERT Reference # GoodPasswords, February 1, 2001. http://www.auscert.org.au/render.html?it=2260 (accessed March 2006).
-
-
-
-
7
-
-
34250774371
-
-
accessed May 2006
-
Debian Package: GPW, http://www.mnis.fr/deb30/utils/gpw.html (accessed May 2006).
-
Debian Package: GPW
-
-
-
9
-
-
34250754824
-
-
Federal Information Processing Standards Publication 181, National Institute of Standards and Technology, October 5, accessed February
-
Federal Information Processing Standards Publication 181, Standard for Automated Password Generator. National Institute of Standards and Technology, October 5, 1993. http://www.itl.nist.gov/fipspubs/fip181.htm (accessed February 2006).
-
(1993)
Standard for Automated Password Generator
-
-
-
11
-
-
34250739764
-
-
Gasser, M. A Random Word Generator for Pronounceable Passwords. Technical Report ESD-TR-75-97, Electronic Systems Division, Hanscom Air Force Base, 1975.
-
Gasser, M. A Random Word Generator for Pronounceable Passwords. Technical Report ESD-TR-75-97, Electronic Systems Division, Hanscom Air Force Base, 1975.
-
-
-
-
12
-
-
34250737236
-
-
Google Accounts. Edit Password. https://www.google.com/ accounts/EditPasswd (accessed May 2006).
-
Google Accounts. "Edit Password." https://www.google.com/ accounts/EditPasswd (accessed May 2006).
-
-
-
-
13
-
-
34250698842
-
-
accessed February 2006
-
The Google API, http://www.google.com/apis/ (accessed February 2006).
-
-
-
The Google, A.P.I.1
-
14
-
-
84877943706
-
-
accessed February 2006
-
John the Ripper, http://www.openwall.com/john/ (accessed February 2006).
-
John the Ripper
-
-
-
17
-
-
34250759715
-
-
Klein, D. V., Foiling the Cracker; A Survey of, and Improvements to Unix Password Security, (revised paper with new data) Proceedings of the 14th DoE Computer Security Group, May 1991.
-
Klein, D. V., Foiling the Cracker; A Survey of, and Improvements to Unix Password Security", (revised paper with new data) Proceedings of the 14th DoE Computer Security Group, May 1991.
-
-
-
-
18
-
-
34250713253
-
-
Kotadia, M. Microsoft Security Guru: Jot Down Your Passwords. CNET News.com, May 23, 2005. http://news.com.com/ Microsoft+security+guru+Jot+down+your+passwords/2100-7355_3-5716590.html (accessed March 2006).
-
Kotadia, M. Microsoft Security Guru: Jot Down Your Passwords. CNET News.com, May 23, 2005. http://news.com.com/ Microsoft+security+guru+Jot+down+your+passwords/2100-7355_3-5716590.html (accessed March 2006).
-
-
-
-
19
-
-
34250740275
-
-
Mac OS X Password Assistant. Passwords: Safety in Numbers. http://www.apple.com/macosx/tips/password13.html (accessed May 2006).
-
Mac OS X Password Assistant. "Passwords: Safety in Numbers." http://www.apple.com/macosx/tips/password13.html (accessed May 2006).
-
-
-
-
20
-
-
34250786065
-
-
Microsoft Corporation, Personal Information, November 30, accessed March
-
Microsoft Corporation. Strong Passwords - How to Create and Use Them. Security At Home, Personal Information, November 30, 2005. http://www.microsoft. com/athome/security/privacy/password.mspx (accessed March 2006).
-
(2005)
Security At Home, Strong Passwords - How to Create and Use Them
-
-
-
21
-
-
84873075288
-
-
accessed July
-
Moncur, M. The Quotations Page. http://www.quotationspage.com/quotes/ (accessed July 2004).
-
(2004)
The Quotations Page
-
-
Moncur, M.1
-
22
-
-
34250691402
-
-
Mozilla Corporation
-
Mozilla Corporation, http://www.mozilla.com.
-
-
-
-
23
-
-
84871444505
-
-
accessed February 2006
-
Password Cracking Wordlist, http://www.openwall.com/wordlists/ (accessed February 2006).
-
Password Cracking Wordlist
-
-
-
24
-
-
84871426316
-
-
accessed February 2006
-
Password Safe, http://passwordsafe.sourceforge.net/ (accessed February 2006).
-
Password Safe
-
-
-
25
-
-
34250694813
-
-
Quoteland.com. Quoteland.com...all the right words! http://www.quoteland. com/author.asp (accessed July 2004).
-
Quoteland.com. Quoteland.com...all the right words! http://www.quoteland. com/author.asp (accessed July 2004).
-
-
-
-
26
-
-
34250763048
-
-
Rhymes.org.uk. Nursery Rhymes - Lyrics and Origins! http://www.rhymes. org.uk/ (accessed July 2004).
-
Rhymes.org.uk. Nursery Rhymes - Lyrics and Origins! http://www.rhymes. org.uk/ (accessed July 2004).
-
-
-
-
27
-
-
25844529824
-
-
University of Texas at Austin, Department of Advertising, February 10, accessed July
-
Richards, J.I. Research. University of Texas at Austin, Department of Advertising, February 10, 1997. http://advertising.utexas.edu/research/slogans/ index.asp (accessed July 2004).
-
(1997)
Research
-
-
Richards, J.I.1
-
28
-
-
0035387175
-
Transforming the weakest link: A human-computer interaction approach to usable and effective security
-
Sasse, M. A., Brostoff, S., and Weirich, D. Transforming the weakest link: a human-computer interaction approach to usable and effective security. BT Technology Journal, Vol 19(3), 2001, pp. 122-131.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
29
-
-
0028406329
-
Pass-sentence - a new approach to computer code
-
Spector, Y., and Ginzberg, J. Pass-sentence - a new approach to computer code. Computers & Security, Vol 13, 1994, pp. 145-160.
-
(1994)
Computers & Security
, vol.13
, pp. 145-160
-
-
Spector, Y.1
Ginzberg, J.2
-
30
-
-
34250705182
-
-
The Song Lyrics. Song Lyrics. http://www.thesonglyrics.com/ (accessed July 2004).
-
The Song Lyrics. Song Lyrics. http://www.thesonglyrics.com/ (accessed July 2004).
-
-
-
-
31
-
-
84878148303
-
-
accessed February 2006
-
United States Coast Guard, http://www.uscg.mil/HQ/PSC/cghrms/ using_peoplesoft/how_to_change_your_password.htm (accessed February 2006).
-
United States Coast Guard
-
-
-
32
-
-
34250773306
-
-
University of Chicago, Networking Services and Information Technologies, accessed March
-
University of Chicago, Networking Services and Information Technologies. "Choosing Good Passwords," 2002. http://security.uchicago.edu/docs/ userpassword.shtml (accessed March 2006).
-
(2002)
Choosing Good Passwords
-
-
-
33
-
-
34250756433
-
-
University of Colorado, Department of Computer Science, November, accessed February
-
University of Colorado, Department of Computer Science. "Password Policy," November 2004. http://www.cs.colorado.edu/~lizb/internal/password- policy.html (accessed February 2006).
-
(2004)
Password Policy
-
-
-
34
-
-
34250702558
-
-
University of New Orleans, Department of Computer Science, accessed February
-
University of New Orleans, Department of Computer Science. How Do I Create A Secure Password? Reprint of article in ;login 21, no. 3 (1996). http://www.cs.uno.edu/Resources/FAQ/faq4.html (accessed February 2006).
-
(1996)
How Do I Create A Secure Password? Reprint of article in ;login
, vol.21
, Issue.3
-
-
-
35
-
-
34250744061
-
-
July 31, accessed May
-
Van Vleck, T. "Java Password Generator," July 31, 1997. http://www.multicians.org/thw/gpw.html (accessed May 2006).
-
(1997)
Java Password Generator
-
-
Van Vleck, T.1
-
36
-
-
0008915230
-
The Memorability and Security of Passwords - Some Empirical Results
-
Technical Report No. 500, Computer Laboratory, University of Cambridge
-
Yan. J., Blackwell A., Anderson, A., and Grant A. The Memorability and Security of Passwords - Some Empirical Results. Technical Report No. 500, Computer Laboratory, University of Cambridge, 2000.
-
(2000)
-
-
Yan, J.1
Blackwell, A.2
Anderson, A.3
Grant, A.4
-
37
-
-
0025545602
-
Cognitive Passwords: The Key to Easy Access Control
-
Zviran. M., and Haga, W.J. Cognitive Passwords: The Key to Easy Access Control. Computers & Security, Vol 9, 1990, pp. 723-736.
-
(1990)
Computers & Security
, vol.9
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
|