-
3
-
-
27544477471
-
-
NIST Special Publication 800-63, Version 1
-
Burr, W.E., Dodson, D.F., and Polk, W.T. Electronic Authentication Guideline. NIST Special Publication 800-63, Version 1, 2004.
-
(2004)
Electronic Authentication Guideline
-
-
Burr, W.E.1
Dodson, D.F.2
Polk, W.T.3
-
4
-
-
84900557334
-
-
British Computer Society HCI
-
Chiasson, S., Forget, A., Biddle, R., and van Oorschot, P.C. Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. British Computer Society HCI 2008.
-
(2008)
Influencing Users Towards Better Passwords: Persuasive Cued Click-Points
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
van Oorschot, P.C.4
-
5
-
-
80052801173
-
A Usability Study and Critique of Two Password Managers
-
Chiasson, S., van Oorschot, P.C., and Biddle, R. A Usability Study and Critique of Two Password Managers. USENIX Security Symposium 2006, 1-16.
-
(2006)
USENIX Security Symposium
, pp. 1-16
-
-
Chiasson, S.1
van Oorschot, P.C.2
Biddle, R.3
-
8
-
-
35348884906
-
A Large-Scale Study of Web Password Habits
-
Florencio, D. and Herley, C. A Large-Scale Study of Web Password Habits. WWW 2007, ACM Press, 657-666.
-
ACM Press, 657-666
, vol.WWW 2007
-
-
Florencio, D.1
Herley, C.2
-
10
-
-
65449175131
-
-
Springer-Verlag
-
Forget, A., Chiasson, S., van Oorschot, P.C., and Biddle, R. Persuasion for Stronger Passwords. Persuasive Technology 2008, Springer-Verlag.
-
(2008)
Persuasion for Stronger Passwords. Persuasive Technology
-
-
Forget, A.1
Chiasson, S.2
van Oorschot, P.C.3
Biddle, R.4
-
11
-
-
57049117189
-
Persuasion as Education for Computer Security
-
Forget, A., Chiasson, S., and Biddle, R. Persuasion as Education for Computer Security. AACE E-Learn 2007, 822-829.
-
(2007)
AACE E-Learn
, pp. 822-829
-
-
Forget, A.1
Chiasson, S.2
Biddle, R.3
-
12
-
-
36549049369
-
An assessment of website password practices
-
Furnell, S. An assessment of website password practices. Computers & Security 26, 7-8 (2007), 445-451.
-
(2007)
Computers & Security
, vol.26
, Issue.7-8
, pp. 445-451
-
-
Furnell, S.1
-
13
-
-
65449155359
-
-
ACM
-
Halderman, J.A., Waters, B., and Felten, E.W. A Convenient Method for Securely Managing Passwords. ACM WWW 2005, 471-479.
-
A Convenient Method for Securely Managing Passwords
, vol.WWW 2005
, pp. 471-479
-
-
Halderman, J.A.1
Waters, B.2
Felten, E.W.3
-
14
-
-
33846318568
-
Have the cake and eat it too - Infusing usability into text-password based authentication systems
-
Jeyaraman, S. and Topkara, U. Have the cake and eat it too - Infusing usability into text-password based authentication systems. IEEE ACSAC 2005, 473-482.
-
(2005)
IEEE ACSAC
, pp. 473-482
-
-
Jeyaraman, S.1
Topkara, U.2
-
15
-
-
85084161999
-
The Design and Analysis of Graphical Passwords
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., and Rubin, A.D. The Design and Analysis of Graphical Passwords. USENIX Security Symposium 1999.
-
(1999)
USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
16
-
-
34250767745
-
Human Selection of Mnemonic Phrase-based Passwords
-
Kuo, C., Romanosky, S., and Cranor, L.F. Human Selection of Mnemonic Phrase-based Passwords. ACM SOUPS 2006, 67-78.
-
(2006)
ACM SOUPS
, pp. 67-78
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
18
-
-
58149454829
-
Short-term retention of individual verbal items
-
Peterson, L.R. and Peterson, M.J. Short-term retention of individual verbal items. Experimental Psychology 58, 3 (1959), 193-198.
-
(1959)
Experimental Psychology
, vol.58
, Issue.3
, pp. 193-198
-
-
Peterson, L.R.1
Peterson, M.J.2
-
19
-
-
12244272072
-
Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates
-
Pond, R., Podd, J., Bunnell, J., and Henderson, R. Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates. Computers & Security 19, 7 (2000), 645-656.
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 645-656
-
-
Pond, R.1
Podd, J.2
Bunnell, J.3
Henderson, R.4
-
20
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
Proctor, R.W., Lien, M.-C., Vu, K.-P.L. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Research Methods, Instruments, & Computers 32, 2 (2002), 163-169.
-
(2002)
Behavior Research Methods, Instruments, & Computers
, vol.32
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.-C.2
Vu, K.-P.L.3
-
22
-
-
84863469085
-
Stronger Password Authentication Using Browser Extensions
-
Ross, B., Jackson, C., Miyake, N., Boneh, D., and Mitchell, J.C. Stronger Password Authentication Using Browser Extensions. USENIX Security Symposium 2005, 17-31.
-
(2005)
USENIX Security Symposium
, pp. 17-31
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
23
-
-
84944486544
-
Prediction and Entropy of Printed English
-
Shannon, C.E. Prediction and Entropy of Printed English. Bell System Technical Journal 30, 1 (1951), 50-64.
-
(1951)
Bell System Technical Journal
, vol.30
, Issue.1
, pp. 50-64
-
-
Shannon, C.E.1
-
24
-
-
84994436127
-
-
St. Clair, L., Johansen, L., Enck, W., Pirretti, M., Traynor, P., McDaniel, P., and Jaeger, T. Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006, Springer-Verlag, 37-55.
-
St. Clair, L., Johansen, L., Enck, W., Pirretti, M., Traynor, P., McDaniel, P., and Jaeger, T. Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006, Springer-Verlag, 37-55.
-
-
-
-
26
-
-
50049096256
-
A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks
-
Thames, J.L., Abler, R., and Keeling, D. A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks. IEEE Southeastcon 2008, 84-89.
-
(2008)
IEEE Southeastcon
, pp. 84-89
-
-
Thames, J.L.1
Abler, R.2
Keeling, D.3
-
27
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
Vu, K.-P.L., Proctor, R.W., Bhargav-Spantzel, A., Tai, B.-L., Cook, J., and Schultz, E.E. Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies 65, 8 (2007), 744-757.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, Issue.8
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.4
Cook, J.5
Schultz, E.E.6
-
28
-
-
85084161247
-
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
-
Whitten, A. and Tygar, J.D. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. USENIX Security Symposium 1999, 169-183.
-
(1999)
USENIX Security Symposium
, pp. 169-183
-
-
Whitten, A.1
Tygar, J.D.2
-
29
-
-
12844275960
-
Password Memorability and Security: Empirical Results
-
Yan, J., Blackwell, A., Anderson, R., and Grant, A. Password Memorability and Security: Empirical Results. IEEE Security & Privacy Magazine 2, 5 (2004), 25-31.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.25-31
, pp. 5
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|