-
1
-
-
84868912993
-
-
Available online
-
Maltego. Available online: http://www.paterva.com/maltego/.
-
Maltego
-
-
-
3
-
-
65449152455
-
Trend in canine names reflects the times
-
Oct 12
-
J. Chao. Trend in canine names reflects the times. San Francisco Examiner, page B1, Oct 12 1997.
-
(1997)
San Francisco Examiner
-
-
Chao, J.1
-
4
-
-
84868928182
-
-
Facebook. Statistics. http://www.facebook.com/press/info.php?statistics.
-
Statistics
-
-
-
8
-
-
3042823619
-
Email-based identification and authentication: An alternative to PKI?
-
S. Garfinkel. Email-based identification and authentication: an alternative to PKI? IEEE Security & Privacy Magazine, 1(6): 20-26, 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.6
, pp. 20-26
-
-
Garfinkel, S.1
-
10
-
-
0005661981
-
Question-and-answer passwords: An empirical evaluation
-
W. Haga and M. Zviran. Question-and-answer passwords: an empirical evaluation. Information Systems, 16(3):335-343, 1991.
-
(1991)
Information Systems
, vol.16
, Issue.3
, pp. 335-343
-
-
Haga, W.1
Zviran, M.2
-
11
-
-
57649187363
-
Love and authentication
-
New York, NY, USA, ACM
-
M. Jakobsson, E. Stolterman, S. Wetzel, and L. Yang. Love and authentication. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 197-200, New York, NY, USA, 2008. ACM.
-
(2008)
CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems
, pp. 197-200
-
-
Jakobsson, M.1
Stolterman, E.2
Wetzel, S.3
Yang, L.4
-
12
-
-
12844256425
-
Designing and evaluating challenge-question systems
-
Sept.-Oct
-
M. Just. Designing and evaluating challenge-question systems. IEEE Security and Privacy Magazine, 2(5):32-39, Sept.-Oct. 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.5
, pp. 32-39
-
-
Just, M.1
-
15
-
-
84868924592
-
-
Office of the Privacy Commissioner of Canada, Available Online, asp, October
-
Office of the Privacy Commissioner of Canada. "Guidelines for Identification and Authentication". Available Online. http://www.privcom. gc.ca/ information/ guide/ auth-061013-e.asp, October 2006.
-
(2006)
Guidelines for Identification and Authentication
-
-
-
16
-
-
65449158633
-
Call Center Customer Verification by Query-Directed Passwords
-
Key West, FL, USA, February 9-12, Revised Papers. Springer
-
L. O'Gorman, A. Bagga, and J. Bentley. Call Center Customer Verification by Query-Directed Passwords. In Financial Cryptography: 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004: Revised Papers. Springer, 2004.
-
(2004)
Financial Cryptography: 8th International Conference, FC 2004
-
-
O'Gorman, L.1
Bagga, A.2
Bentley, J.3
-
18
-
-
65449172618
-
-
SSA Publication No. 05-10064. Available online:, October
-
Social Security Administration. "Identity Theft and Your Social Security Number". SSA Publication No. 05-10064. Available online: http://www.socialsecurity.gov/pubs/10064.html, October 2007.
-
(2007)
Identity Theft and Your Social Security Number
-
-
-
19
-
-
84868935275
-
-
Available online, 2008
-
Social Security Administration. RSA Identity Verification. Available online. http://www.rsa.com/node.aspx?id=3347, 2008.
-
RSA Identity Verification
-
-
-
20
-
-
67650411000
-
-
Available online, Not Dated
-
Social Security Administration. The SSN Numbering Scheme. Available online. http://www.socialsecurity.gov/history/ssn/geocard.html, Not Dated.
-
The SSN Numbering Scheme
-
-
|