-
1
-
-
0018543411
-
Password Security: A Case History
-
R. Morris and K. Thompson, "Password Security: A Case History," Comm. ACM, vol. 22, no. 11, 1979, pp. 594-597.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
2
-
-
60649116908
-
Authentication using Graphical Passwords: Effects of Tolerance and image Choice
-
ACM Press
-
S. Wiedenback et al., "Authentication using Graphical Passwords: Effects of Tolerance and image Choice," Proc. Symp. Usable Privacy and Security, ACM Press, 2005, pp. 1-12.
-
(2005)
Proc. Symp. Usable Privacy and Security
, pp. 1-12
-
-
Wiedenback, S.1
-
3
-
-
0019895650
-
A Password Extension for improved Human Factors
-
S.N.A. Porter, "A Password Extension for improved Human Factors," Computers & Security, vol. 1, no. 1, 1982, pp. 54-56.
-
(1982)
Computers & Security
, vol.1
, Issue.1
, pp. 54-56
-
-
Porter, S.N.A.1
-
4
-
-
0021481768
-
Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms
-
J.A. Haskett, "Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms," Comm. ACM, vol. 27, no. 8, 1984, pp. 777-781.
-
(1984)
Comm. ACM
, vol.27
, Issue.8
, pp. 777-781
-
-
Haskett, J.A.1
-
5
-
-
0021470294
-
User-Friendly Password Methods for Computer-Mediated Information Systems
-
B.F. Barton and M.S. Barton, "User-Friendly Password Methods for Computer-Mediated Information Systems," Computers a Security, vol. 3, no. 3, 1984, pp. 186-195.
-
(1984)
Computers a Security
, vol.3
, Issue.3
, pp. 186-195
-
-
Barton, B.F.1
Barton, M.S.2
-
6
-
-
0025545602
-
Cognitive Passwords: The Key to Easy Access Control
-
M. Zviran and W.J. Haga, "Cognitive Passwords: The Key to Easy Access Control," Computers & Security, vol. 9, no. 8, 1990, pp. 723-736.
-
(1990)
Computers & Security
, vol.9
, Issue.8
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
-
7
-
-
0003429117
-
Are Passfaces More Usable than Passwords? A Field Trial investigation
-
ACM Press
-
S. Brostoff and A.M. Sasse, "Are Passfaces More Usable than Passwords? A Field Trial investigation," Proc. Human-Computer Interactions (CHI 00), ACM Press, 2000, pp. 405-424.
-
(2000)
Proc. Human-Computer Interactions (CHI 00)
, pp. 405-424
-
-
Brostoff, S.1
Sasse, A.M.2
-
8
-
-
0005765077
-
The Design and Analysis of Graphical Passwords
-
Usenix Assoc
-
I. Jermyn et al., "The Design and Analysis of Graphical Passwords," Proc. 9th, Usenix Security Symp., Usenix Assoc., 2000, pp. 1-14.
-
(2000)
Proc. 9th, Usenix Security Symp
, pp. 1-14
-
-
Jermyn, I.1
-
9
-
-
85084161493
-
Deja Vu: A User Study Using Images for Authentication
-
Usenix Assoc
-
R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," Proc. 9th Usenix Security Symp.," Usenix Assoc., 2000, pp. 45-58.
-
(2000)
Proc. 9th Usenix Security Symp
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
10
-
-
85084162383
-
On User Choice in Graphical Password Schemes
-
Usenix Assoc
-
D. Davis, F. Monrose, and M.K. Reiter, "On User Choice in Graphical Password Schemes," Proc. 13th Usenix Security Symp., Usenix Assoc., 2004, pp. 151-164.
-
(2004)
Proc. 13th Usenix Security Symp
, pp. 151-164
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
11
-
-
85084163855
-
Graphical Dictionaries and the Memorable Space of Graphical Passwords
-
Usenix Assoc
-
J. Thorpe and P.C.V. Oorschot, "Graphical Dictionaries and the Memorable Space of Graphical Passwords," Proc. 13th Usenix Security Symp., Usenix Assoc., 2004, pp. 135-150.
-
(2004)
Proc. 13th Usenix Security Symp
, pp. 135-150
-
-
Thorpe, J.1
Oorschot, P.C.V.2
-
12
-
-
0040268965
-
Internet Privacy Enhanced Mail
-
S.T. Kent, "Internet Privacy Enhanced Mail," Comm. ACM, vol. 36, no. 8, 1993, pp. 48-60.
-
(1993)
Comm. ACM
, vol.36
, Issue.8
, pp. 48-60
-
-
Kent, S.T.1
-
14
-
-
44449165905
-
-
S. Garfinkel, Signed, Sealed and Delivered, CSO Online, April 2004, www.csoonline.com/read/040104/shop.html.
-
S. Garfinkel, "Signed, Sealed and Delivered," CSO Online, April 2004, www.csoonline.com/read/040104/shop.html.
-
-
-
-
17
-
-
85084161247
-
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
-
Usenix Assoc
-
A. Whitten and J.D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," Proc. 8th, Usenix Security Sym., Usenix Assoc., 1999, pp. 169-184.
-
(1999)
Proc. 8th, Usenix Security Sym
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.D.2
-
18
-
-
77953753799
-
Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express
-
ACM Press
-
S.L. Garfinkel and R.C. Miller, "Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express," Proc. Symp. Usable Privacy and Security, ACM Press, 2005, pp. 13-24.
-
(2005)
Proc. Symp. Usable Privacy and Security
, pp. 13-24
-
-
Garfinkel, S.L.1
Miller, R.C.2
-
22
-
-
0034777649
-
Intercepting Mobile Communications: The Insecurity of 802.1l
-
ACM Press
-
N. Borizov, I. Goldberg, and D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.1l," Proc. Int'l Conf. Mobile Computinq and Networking (Mobicom 01), ACM Press, 2001, pp. 180-189.
-
(2001)
Proc. Int'l Conf. Mobile Computinq and Networking (Mobicom 01)
, pp. 180-189
-
-
Borizov, N.1
Goldberg, I.2
Wagner, D.3
-
23
-
-
84949223752
-
Weaknesses in the Key Scheduling Algorithm of RC4
-
Springer
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4," Proc. 8th Ann. Workshop Selected Areas in Cryptography, Springer, 2001, pp. 1-24.
-
(2001)
Proc. 8th Ann. Workshop Selected Areas in Cryptography
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
24
-
-
85084163516
-
Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute
-
Usenix Assoc
-
D. Balfanz et al., "Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute," Usenix Security Symp., Usenix Assoc., 2004, pp. 207-222.
-
(2004)
Usenix Security Symp
, pp. 207-222
-
-
Balfanz, D.1
-
25
-
-
0038713945
-
Usability and Privacy: A Study of Kazaa P2P File-Sharing
-
ACM Press
-
N.S. Good and A. Krekelberg, "Usability and Privacy: A Study of Kazaa P2P File-Sharing," Proc. Human-Computer Interactions (CHI 03), vol. 5, ACM Press, 2003, pp. 137-144.
-
(2003)
Proc. Human-Computer Interactions (CHI 03)
, vol.5
, pp. 137-144
-
-
Good, N.S.1
Krekelberg, A.2
|