메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-12

Improving text passwords through persuasion

Author keywords

Authentication; Passwords; Persuasive technology; Usable security

Indexed keywords

MEMORY LOADS; OPEN PROBLEMS; PASSWORD SECURITIES; PASSWORD STRENGTHS; PASSWORDS; PERSUASIVE TECHNOLOGY; RANDOM CHARACTERS; RANDOM POSITIONS; RESTRICTION POLICIES; TEXT PASSWORDS; USABLE SECURITY; USER STUDIES;

EID: 65449177711     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1408664.1408666     Document Type: Conference Paper
Times cited : (111)

References (29)
  • 8
    • 35348884906 scopus 로고    scopus 로고
    • A Large-Scale Study of Web Password Habits
    • Florencio, D. and Herley, C. A Large-Scale Study of Web Password Habits. WWW 2007, ACM Press, 657-666.
    • ACM Press, 657-666 , vol.WWW 2007
    • Florencio, D.1    Herley, C.2
  • 11
    • 57049117189 scopus 로고    scopus 로고
    • Persuasion as Education for Computer Security
    • Forget, A., Chiasson, S., and Biddle, R. Persuasion as Education for Computer Security. AACE E-Learn 2007, 822-829.
    • (2007) AACE E-Learn , pp. 822-829
    • Forget, A.1    Chiasson, S.2    Biddle, R.3
  • 12
    • 36549049369 scopus 로고    scopus 로고
    • An assessment of website password practices
    • Furnell, S. An assessment of website password practices. Computers & Security 26, 7-8 (2007), 445-451.
    • (2007) Computers & Security , vol.26 , Issue.7-8 , pp. 445-451
    • Furnell, S.1
  • 14
    • 33846318568 scopus 로고    scopus 로고
    • Have the cake and eat it too - Infusing usability into text-password based authentication systems
    • Jeyaraman, S. and Topkara, U. Have the cake and eat it too - Infusing usability into text-password based authentication systems. IEEE ACSAC 2005, 473-482.
    • (2005) IEEE ACSAC , pp. 473-482
    • Jeyaraman, S.1    Topkara, U.2
  • 16
    • 34250767745 scopus 로고    scopus 로고
    • Human Selection of Mnemonic Phrase-based Passwords
    • Kuo, C., Romanosky, S., and Cranor, L.F. Human Selection of Mnemonic Phrase-based Passwords. ACM SOUPS 2006, 67-78.
    • (2006) ACM SOUPS , pp. 67-78
    • Kuo, C.1    Romanosky, S.2    Cranor, L.F.3
  • 18
    • 58149454829 scopus 로고
    • Short-term retention of individual verbal items
    • Peterson, L.R. and Peterson, M.J. Short-term retention of individual verbal items. Experimental Psychology 58, 3 (1959), 193-198.
    • (1959) Experimental Psychology , vol.58 , Issue.3 , pp. 193-198
    • Peterson, L.R.1    Peterson, M.J.2
  • 19
    • 12244272072 scopus 로고    scopus 로고
    • Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates
    • Pond, R., Podd, J., Bunnell, J., and Henderson, R. Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates. Computers & Security 19, 7 (2000), 645-656.
    • (2000) Computers & Security , vol.19 , Issue.7 , pp. 645-656
    • Pond, R.1    Podd, J.2    Bunnell, J.3    Henderson, R.4
  • 20
    • 0036559882 scopus 로고    scopus 로고
    • Improving computer security for authentication of users: Influence of proactive password restrictions
    • Proctor, R.W., Lien, M.-C., Vu, K.-P.L. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Research Methods, Instruments, & Computers 32, 2 (2002), 163-169.
    • (2002) Behavior Research Methods, Instruments, & Computers , vol.32 , Issue.2 , pp. 163-169
    • Proctor, R.W.1    Lien, M.-C.2    Vu, K.-P.L.3
  • 23
    • 84944486544 scopus 로고
    • Prediction and Entropy of Printed English
    • Shannon, C.E. Prediction and Entropy of Printed English. Bell System Technical Journal 30, 1 (1951), 50-64.
    • (1951) Bell System Technical Journal , vol.30 , Issue.1 , pp. 50-64
    • Shannon, C.E.1
  • 24
    • 84994436127 scopus 로고    scopus 로고
    • St. Clair, L., Johansen, L., Enck, W., Pirretti, M., Traynor, P., McDaniel, P., and Jaeger, T. Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006, Springer-Verlag, 37-55.
    • St. Clair, L., Johansen, L., Enck, W., Pirretti, M., Traynor, P., McDaniel, P., and Jaeger, T. Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006, Springer-Verlag, 37-55.
  • 26
    • 50049096256 scopus 로고    scopus 로고
    • A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks
    • Thames, J.L., Abler, R., and Keeling, D. A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks. IEEE Southeastcon 2008, 84-89.
    • (2008) IEEE Southeastcon , pp. 84-89
    • Thames, J.L.1    Abler, R.2    Keeling, D.3
  • 28
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
    • Whitten, A. and Tygar, J.D. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. USENIX Security Symposium 1999, 169-183.
    • (1999) USENIX Security Symposium , pp. 169-183
    • Whitten, A.1    Tygar, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.