메뉴 건너뛰기




Volumn 16, Issue 1, 2007, Pages 2-8

The good and not so good of enforcing password composition rules

Author keywords

[No Author keywords available]

Indexed keywords


EID: 67650124268     PISSN: 1065898X     EISSN: None     Source Type: Journal    
DOI: 10.1080/10658980601051375     Document Type: Article
Times cited : (18)

References (20)
  • 3
    • 18544374846 scopus 로고    scopus 로고
    • Evaluation of the human impact of password authentication practices on information security
    • Carstens, D. S., McCauley-Bell, P., Malone, L. C., and DeMara, R. F. (2004). Evaluation of the Human Impact of Password Authentication Practices on Information Security. Informing Science Journal, 7:1, 67-85.
    • (2004) Informing Science Journal , vol.7 , Issue.1 , pp. 67-85
    • Carstens, D.S.1    McC-BELLauley-Bell, P.2    Malone, L.C.3    DeMara, R.F.4
  • 5
    • 84869135566 scopus 로고    scopus 로고
    • http://fedora.redhat.com/ (accessed February 2006)
    • Fedora. (2006). Fedora Core 5, http://fedora.redhat.com/ (accessed February 2006).
    • (2006) Fedora Core 5
  • 8
    • 12344260479 scopus 로고    scopus 로고
    • One born every minute
    • Haggerty, J., and Taylor, M. (2005). One born every minute. ITNOW, 47, 26-27.
    • (2005) ITNOW , vol.47 , pp. 26-27
    • Haggerty, J.1    Taylor, M.2
  • 11
    • 0002619432 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Levenshtein, V. (1965). Binary codes capable of correcting deletions, insertions, and reversals. Problems in Information Transmission, 1, 8-17.
    • (1965) Problems in Information Transmission , vol.1 , pp. 8-17
    • Levenshtein, V.1
  • 12
    • 84869127543 scopus 로고    scopus 로고
    • http://www.microsoft.com/technet/prodtechnol/ windowsserver2003/technologies/directory/activedirectory/ stepbystep/strngpw.mspx#EMD (accessed June 2006)
    • Microsoft. (2006). Step-by-Step Guide to Enforcing Strong Password Policies. http://www.microsoft.com/technet/prodtechnol/ windowsserver2003/technologies/directory/activedirectory/ stepbystep/strngpw.mspx#EMD (accessed June 2006).
    • (2006) Step-By-Step Guide to Enforcing Strong Password Policies
  • 16
    • 85024007549 scopus 로고    scopus 로고
    • http://securityresponse.symantec.com/ avcenter/venc/data/ppauditor.html (accessed June 20, 2006)
    • Symantec. (2006a). PPAuditor, http://securityresponse.symantec.com/ avcenter/venc/data/ppauditor.html (accessed June 20, 2006).
    • (2006) Ppauditor
  • 17
    • 84869141231 scopus 로고    scopus 로고
    • http://securityresponse.symantec. com/avcenter/venc/data/rainbowcrack.html (accessed June 20, 2006)
    • Symantec. (2006b). RainbowCrack, http://securityresponse.symantec. com/avcenter/venc/data/rainbowcrack.html (accessed June 20, 2006).
    • (2006) Rainbowcrack
  • 19
    • 15744386905 scopus 로고    scopus 로고
    • Breaking an improved password authenticated key exchange protocol for imbalanced wireless networks
    • Zhang, M. (2005). Breaking an Improved Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks. IEEE Communications Letters, 9:3, 276-278.
    • (2005) IEEE Communications Letters , vol.9 , Issue.3 , pp. 276-278
    • Zhang, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.