메뉴 건너뛰기




Volumn , Issue , 2007, Pages 292-299

Passwords decay, words endure: Secure and re-usable multiple password mnemonics

Author keywords

Authentication; Mnemonic sentence; Natural language processing; Passwords; Usability

Indexed keywords

AUTHENTICATION; DATA STORAGE EQUIPMENT; INTERNET SERVICE PROVIDERS; PORTABLE EQUIPMENT; USABILITY ENGINEERING; USER INTERFACES; WEB BROWSERS;

EID: 35248853285     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1244002.1244072     Document Type: Conference Paper
Times cited : (14)

References (18)
  • 1
    • 0027758414 scopus 로고    scopus 로고
    • R. Anderson. Why cryptosystems fail. In CCS '93: Proceedings of the 1st ACM Conference on Computer and communications Security, pages 215-227, New York, NY, USA, 1993. ACM Press.
    • R. Anderson. Why cryptosystems fail. In CCS '93: Proceedings of the 1st ACM Conference on Computer and communications Security, pages 215-227, New York, NY, USA, 1993. ACM Press.
  • 3
    • 0003532271 scopus 로고
    • Unix password security - ten years later
    • D. C. Feldmeier and P. R. Karp. Unix password security - ten years later. In CRYPTO, pages 44-63, 1989.
    • (1989) CRYPTO , pp. 44-63
    • Feldmeier, D.C.1    Karp, P.R.2
  • 6
    • 33846318568 scopus 로고    scopus 로고
    • Have the cake and eat it too - infusing usability into text-password based authentication systems
    • Washington, DC, USA, IEEE Computer Society
    • S. Jeyaraman and U. Topkara. Have the cake and eat it too - infusing usability into text-password based authentication systems. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 473-482, Washington, DC, USA, 2005. IEEE Computer Society.
    • (2005) ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference , pp. 473-482
    • Jeyaraman, S.1    Topkara, U.2
  • 8
    • 84918667752 scopus 로고
    • Human Memory and the Storage of Information
    • G. Miller. Human Memory and the Storage of Information. Information Theory, IEEE Transactions on, 2(3):129-137, 1956.
    • (1956) Information Theory, IEEE Transactions on , vol.2 , Issue.3 , pp. 129-137
    • Miller, G.1
  • 9
    • 0018543411 scopus 로고
    • Password security: A case history
    • R. Morris and K. Thompson. Password security: A case history. ACM Communcations, 22(11):594-597, 1979.
    • (1979) ACM Communcations , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 12
    • 35248815325 scopus 로고    scopus 로고
    • P. Resnik. Selectional preference and sense disambiguation. In The ACL SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How?, Washington D.C., USA, April 1997.
    • P. Resnik. Selectional preference and sense disambiguation. In The ACL SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How?, Washington D.C., USA, April 1997.
  • 15
    • 33750907773 scopus 로고    scopus 로고
    • The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
    • Geneva, Switzerland, September 26-27
    • U. Topkara, M. Topkara, and M. J. Atallah. The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions. In Proceedings of ACM Multimedia and Security Workshop, Geneva, Switzerland, September 26-27, 2006.
    • (2006) Proceedings of ACM Multimedia and Security Workshop
    • Topkara, U.1    Topkara, M.2    Atallah, M.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.