-
1
-
-
0027758414
-
-
R. Anderson. Why cryptosystems fail. In CCS '93: Proceedings of the 1st ACM Conference on Computer and communications Security, pages 215-227, New York, NY, USA, 1993. ACM Press.
-
R. Anderson. Why cryptosystems fail. In CCS '93: Proceedings of the 1st ACM Conference on Computer and communications Security, pages 215-227, New York, NY, USA, 1993. ACM Press.
-
-
-
-
3
-
-
0003532271
-
Unix password security - ten years later
-
D. C. Feldmeier and P. R. Karp. Unix password security - ten years later. In CRYPTO, pages 44-63, 1989.
-
(1989)
CRYPTO
, pp. 44-63
-
-
Feldmeier, D.C.1
Karp, P.R.2
-
5
-
-
34250729756
-
Password management strategies for online accounts
-
New York, NY, USA, ACM Press
-
S. Gaw and E. W. Feiten. Password management strategies for online accounts. In SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security, pages 44-55, New York, NY, USA, 2006. ACM Press.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 44-55
-
-
Gaw, S.1
Feiten, E.W.2
-
6
-
-
33846318568
-
Have the cake and eat it too - infusing usability into text-password based authentication systems
-
Washington, DC, USA, IEEE Computer Society
-
S. Jeyaraman and U. Topkara. Have the cake and eat it too - infusing usability into text-password based authentication systems. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 473-482, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 473-482
-
-
Jeyaraman, S.1
Topkara, U.2
-
7
-
-
34250767745
-
Human selection of mnemonic phrase-based passwords
-
New York, NY, USA, ACM Press
-
C. Kuo, S. Romanosky, and L. F. Cranor. Human selection of mnemonic phrase-based passwords. In SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security, pages 67-78, New York, NY, USA, 2006. ACM Press.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 67-78
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
8
-
-
84918667752
-
Human Memory and the Storage of Information
-
G. Miller. Human Memory and the Storage of Information. Information Theory, IEEE Transactions on, 2(3):129-137, 1956.
-
(1956)
Information Theory, IEEE Transactions on
, vol.2
, Issue.3
, pp. 129-137
-
-
Miller, G.1
-
9
-
-
0018543411
-
Password security: A case history
-
R. Morris and K. Thompson. Password security: A case history. ACM Communcations, 22(11):594-597, 1979.
-
(1979)
ACM Communcations
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
10
-
-
85081941118
-
Wordnet::Similarity - Measuring the Relatedness of Concepts
-
Boston, MA, May
-
T. Pedersen, S. Patwardhan, and J. Michelizzi. Wordnet::Similarity - Measuring the Relatedness of Concepts. In Proceedings of Fifth Annual Meeting of the NAACL, Boston, MA, May 2004.
-
(2004)
Proceedings of Fifth Annual Meeting of the NAACL
-
-
Pedersen, T.1
Patwardhan, S.2
Michelizzi, J.3
-
12
-
-
35248815325
-
-
P. Resnik. Selectional preference and sense disambiguation. In The ACL SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How?, Washington D.C., USA, April 1997.
-
P. Resnik. Selectional preference and sense disambiguation. In The ACL SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How?, Washington D.C., USA, April 1997.
-
-
-
-
13
-
-
0003851399
-
-
John Wiley & Sons, Inc, New York, NY, USA
-
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York, NY, USA, 1993.
-
(1993)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
15
-
-
33750907773
-
The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
-
Geneva, Switzerland, September 26-27
-
U. Topkara, M. Topkara, and M. J. Atallah. The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions. In Proceedings of ACM Multimedia and Security Workshop, Geneva, Switzerland, September 26-27, 2006.
-
(2006)
Proceedings of ACM Multimedia and Security Workshop
-
-
Topkara, U.1
Topkara, M.2
Atallah, M.J.3
-
16
-
-
35248831179
-
Captcha: Using hard ai problems for security
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford. Captcha: Using hard ai problems for security. In Proceedings of Eurocrypt, pages 294-311, 2003.
-
(2003)
Proceedings of Eurocrypt
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
18
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results. IEEE Security and Privacy, 2:25-31, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|