-
1
-
-
0043232732
-
Users are not the Enemy: Why Users Compromise Computer Security Mechanisms and how to Take Remedial Measures
-
A. Adams and M. A. Sasse, "Users are not the Enemy: Why Users Compromise Computer Security Mechanisms and how to Take Remedial Measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
-
(1999)
Communications of the ACM
, vol.42
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
0015279821
-
Is Your Computer Insecure?
-
C. T. Beardsley, "Is Your Computer Insecure?," IEEE Spectrum, vol. 9, pp. 67-78, 1972.
-
(1972)
IEEE Spectrum
, vol.9
, pp. 67-78
-
-
Beardsley, C.T.1
-
6
-
-
0029304865
-
Human and Machine Recognition of Faces: A Survey
-
R. Chellappa, C. L. Wilson, and S. Sirohey, "Human and Machine Recognition of Faces: A Survey," Proceedings of the IEEE, vol. 83, pp. 705-741, 1995.
-
(1995)
Proceedings of the IEEE
, vol.83
, pp. 705-741
-
-
Chellappa, R.1
Wilson, C.L.2
Sirohey, S.3
-
9
-
-
85084162383
-
On User Choice in Graphical Password Schemes
-
presented at, San Diego, CA
-
D. Davis, F. Monrose, and M. Reiter, "On User Choice in Graphical Password Schemes," presented at 13th Usenix Security Symposium, San Diego, CA, 2004.
-
(2004)
13th Usenix Security Symposium
-
-
Davis, D.1
Monrose, F.2
Reiter, M.3
-
10
-
-
0037668484
-
VIP: A Visual Approach to User Authentication
-
presented at, Trento, Italy
-
A. De Angeli, M. Coutts, L. Coventry, D. Cameron, G. I. Johnson, and M. Fischer, "VIP: A Visual Approach to User Authentication," presented at Working Conference on Advanced Visual Interfaces: AVI2002, Trento, Italy, 2002.
-
(2002)
Working Conference on Advanced Visual Interfaces: AVI2002
-
-
De Angeli, A.1
Coutts, M.2
Coventry, L.3
Cameron, D.4
Johnson, G.I.5
Fischer, M.6
-
11
-
-
34250752674
-
Department of Defense Password Management Guideline
-
Department of Defense Computer Security Center, April 12
-
Department of Defense Computer Security Center, "Department of Defense Password Management Guideline," Department of Defense, Washington, DC CSC-STD-002-85, April 12 1985.
-
(1985)
Department of Defense, Washington, DC CSC-STD-002-85
-
-
-
12
-
-
85084161493
-
Deja Vu: A User Study. Using Images for Authentication
-
presented at
-
R. Dhamija and A. Perrig, "Deja Vu: A User Study. Using Images for Authentication," presented at 9th USENDC Security Symposium, 2000.
-
(2000)
9th USENDC Security Symposium
-
-
Dhamija, R.1
Perrig, A.2
-
14
-
-
3943091225
-
A long-term trial of alternative user authentication technologies
-
S. M. Furnell, I. Papadopoulos, and P. S. Dowland, "A long-term trial of alternative user authentication technologies," Information Management and Computer Security, vol. 12, pp. 178-190, 2004.
-
(2004)
Information Management and Computer Security
, vol.12
, pp. 178-190
-
-
Furnell, S.M.1
Papadopoulos, I.2
Dowland, P.S.3
-
15
-
-
84897771350
-
Social Engineering Fundamentals, Part I: Hacker Tactics
-
S. Granger, "Social Engineering Fundamentals, Part I: Hacker Tactics," vol. 2006: SecurityFocus, 2001.
-
(2001)
SecurityFocus
, vol.2006
-
-
Granger, S.1
-
16
-
-
4243096135
-
The Domino Effect of Password Reuse
-
B. Ives, K. R. Walsh, and H. Schneider, "The Domino Effect of Password Reuse," Communications of the ACM, vol. 47, pp. 75-78, 2004.
-
(2004)
Communications of the ACM
, vol.47
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
17
-
-
85084161999
-
The Design and Analysis of Graphical Passwords
-
presented at, Washington, DC
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, "The Design and Analysis of Graphical Passwords," presented at 8th USENDC Security Symposium, Washington, DC, 1999.
-
(1999)
8th USENDC Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
18
-
-
34250707178
-
Using a Combination of Sound and Images to Authenticate Web Users
-
presented at Designing for Society, Bath England
-
J. Liddell, K. Renaud, and A. De Angeli, "Using a Combination of Sound and Images to Authenticate Web Users," presented at 17th Annual Human Computer Interaction Conference: Designing for Society, Bath England, 2003.
-
(2003)
17th Annual Human Computer Interaction Conference
-
-
Liddell, J.1
Renaud, K.2
De Angeli, A.3
-
19
-
-
12244303262
-
A password scheme strongly resistant to spyware
-
presented at, Las Vegas, NV
-
S. Man, D. Hong, B. Hayes, and M. Matthews, "A password scheme strongly resistant to spyware," presented at Int. Conf. on Security and Management, Las Vegas, NV, 2004.
-
(2004)
Int. Conf. on Security and Management
-
-
Man, S.1
Hong, D.2
Hayes, B.3
Matthews, M.4
-
21
-
-
39749093168
-
The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information
-
G. A. Miller, "The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information," The Psychological Review, vol. 63, pp. 81-97, 1956.
-
(1956)
The Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
24
-
-
34250729630
-
Hacking human: Data-archaeology and surveillance in social networks
-
J. Nolan and M. Levesque, "Hacking human: data-archaeology and surveillance in social networks," ACM SIGGROUP Bulliten, vol. 25, pp. 33-37.
-
ACM SIGGROUP Bulliten
, vol.25
, pp. 33-37
-
-
Nolan, J.1
Levesque, M.2
-
25
-
-
10044293457
-
Comparing Passwords, Tokens, and Biometrics for User Authentication
-
L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication," Proceedings of the IEEE, vol. 91, pp. 2021-2039, 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, pp. 2021-2039
-
-
O'Gorman, L.1
-
26
-
-
23944463649
-
The Urgency for Effective User Privacy Education to Counter Social Engineering Attacks on Secure Computer Systems
-
presented at, Salt Lake City, Utah
-
G. Orgill, G. W. Romney, and P. M. Orgill, "The Urgency for Effective User Privacy Education to Counter Social Engineering Attacks on Secure Computer Systems," presented at 5th Coneference on Information Technology Education (SIGITE '04), Salt Lake City, Utah, 2004.
-
(2004)
5th Coneference on Information Technology Education (SIGITE '04)
-
-
Orgill, G.1
Romney, G.W.2
Orgill, P.M.3
-
27
-
-
34250757512
-
-
A. A. Ozok and S. H. Holden, Alphanumeric and Graphical Authentication Solutions: A Comparative
-
A. A. Ozok and S. H. Holden, "Alphanumeric and Graphical Authentication Solutions: A Comparative
-
-
-
|