-
1
-
-
0018543411
-
-
Nov.
-
R. Morris, K. Thompson, "Password security: A case history," Comm. ACM, Vol. 22, no. 11, Nov. 1979, pp. 594-597.
-
(1979)
Password Security: A Case HistoryComm. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
3
-
-
0033633028
-
Authentication and supervision: A survey of user attitudes
-
S. M. Furnell, P. S. Dowland, H. M. Illingworth, P. L. Reynolds, "Authentication and supervision: A survey of user attitudes," Computers and Security, Vol. 19, no. 6, 2000, pp. 529-539.
-
(2000)
Computers and Security
, vol.19
, Issue.6
, pp. 529-539
-
-
Furnell, S.M.1
Dowland, P.S.2
Illingworth, H.M.3
Reynolds, P.L.4
-
4
-
-
0008915230
-
-
TR 500, University of Cambridge, Computer Laboratory, Sept.
-
J. Yan, A. Blackwell, R. Anderson, A. Grant, "The memorability and security of passwords - some empirical results," TR 500, University of Cambridge, Computer Laboratory, Sept. 2000, http://www.cl.cam.ac.uk/TechReports/ UCAM-CL-TR-500.pdf
-
(2000)
The Memorability and Security of Passwords - Some Empirical Results
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
5
-
-
10044293457
-
Comparing Passwords, Tokens, and Biometrics for User Authentication
-
Dec.
-
L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication," Proc. IEEE, Vol. 91, No. 12, Dec. 2003, pp. 2019-2040.
-
(2003)
Proc. IEEE
, vol.91
, Issue.12
, pp. 2019-2040
-
-
O'Gorman, L.1
-
7
-
-
35048891321
-
Dynamic behavior analysis in compressed fingerprint videos
-
Special Issue on Video-Based Biometrics, Oct.
-
C. Dorai, N. K. Ratha, R. Bolle, "Dynamic behavior analysis in compressed fingerprint videos," IEEE Trans. Circuits and Systems for Video Technology, Special Issue on Video-Based Biometrics, Oct. 2003.
-
(2003)
IEEE Trans. Circuits and Systems for Video Technology
-
-
Dorai, C.1
Ratha, N.K.2
Bolle, R.3
-
8
-
-
0021384257
-
Semantic memory content in permastore: Fifty years of memory for Spanish learned in school
-
H. P. Bahrick, "Semantic memory content in permastore: Fifty years of memory for Spanish learned in school," J. of Exp. Psychology: General, 113 (1), 1984, pp. 1-29.
-
(1984)
J. of Exp. Psychology: General
, vol.113
, Issue.1
, pp. 1-29
-
-
Bahrick, H.P.1
-
9
-
-
0034140877
-
Protecting secret keys with personal entropy
-
Feb.
-
C. Ellison, C. Hall, R. Milbert, B. Schneier, "Protecting secret keys with personal entropy," J. of Future Generation Computer Systems, 16 (4), Feb. 2000, pp. 311-318.
-
(2000)
J. of Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 311-318
-
-
Ellison, C.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
10
-
-
0018545449
-
How to share a secret
-
Nov.
-
Shamir, "How to share a secret," Comm. of the ACM, Vol. 22, No. 11, Nov. 1979, pp. 612-613.
-
(1979)
Comm. of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir1
-
11
-
-
0035747783
-
Error-tolerant password recovery
-
P. Samarati, ed., ACM Press
-
N. Frykholm, A. Juels, "Error-tolerant password recovery," in P. Samarati, ed., Eighth ACM Conference on Computer and Communications Security, ACM Press. 2001, pp. 1-8.
-
(2001)
Eighth ACM Conference on Computer and Communications Security
, pp. 1-8
-
-
Frykholm, N.1
Juels, A.2
-
12
-
-
0033281339
-
A fuzzy commitment scheme
-
G. Tsudik, ed., ACM Press
-
Juels, M. Wattenberg, "A fuzzy commitment scheme," in G. Tsudik, ed., Sixth ACM Conf. Computer and Communications Security, ACM Press, 1999, pp. 28-36.
-
(1999)
Sixth ACM Conf. Computer and Communications Security
, pp. 28-36
-
-
Juels, M.W.1
-
13
-
-
84910084579
-
NIST Evaluation of Conversational Speech Recognition over the Telephone
-
Maryland, May
-
J. Fiscus, W. M. Fisher, A. Martin, M. Przybocki, D. S. Pallett, "NIST Evaluation of Conversational Speech Recognition over the Telephone," Speech Transcription Workshop, Maryland, May, 2000. http://www.nist.gov/speech/publications/
-
(2000)
Speech Transcription Workshop
-
-
Fiscus, J.1
Fisher, W.M.2
Martin, A.3
Przybocki, M.4
Pallett, D.S.5
-
14
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop, D. V. Klein, "Improving system security via proactive password checking," Computers and Security, Vol. 14, no. 3, 1995, pp. 233-249.
-
(1995)
Computers and Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
|