-
4
-
-
0034140877
-
Protecting Secret Keys with Personal Entropy
-
C. Ellison, C. Hall, R. Milbert, and B. Schneier. Protecting Secret Keys with Personal Entropy. Future Gener. Comput. Syst., 16(4):311-318, 2000.
-
(2000)
Future Gener. Comput. Syst
, vol.16
, Issue.4
, pp. 311-318
-
-
Ellison, C.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
5
-
-
0035747783
-
Error-tolerant Password Recovery
-
New York, NY, USA, ACM
-
N. Frykholm and A. Juels. Error-tolerant Password Recovery. In CCS '01: Proceedings of the 8th ACM conference on Computer and Communications Security, pages 1-9, New York, NY, USA, 2001. ACM.
-
(2001)
CCS '01: Proceedings of the 8th ACM conference on Computer and Communications Security
, pp. 1-9
-
-
Frykholm, N.1
Juels, A.2
-
6
-
-
57649197168
-
Messin' with Texas, Deriving Mother's Maiden Names Using Public Records
-
V. Griffith and M. Jakobsson. Messin' with Texas, Deriving Mother's Maiden Names Using Public Records. RSA CryptoBytes, 8(1):18-28, 2007.
-
(2007)
RSA CryptoBytes
, vol.8
, Issue.1
, pp. 18-28
-
-
Griffith, V.1
Jakobsson, M.2
-
7
-
-
0005661981
-
Question-and-Answer Passwords: An Empirical Evaluation
-
W. J. Haga and M. Zviran. Question-and-Answer Passwords: an Empirical Evaluation. Inf. Syst., 16(3):335-343, 1991.
-
(1991)
Inf. Syst
, vol.16
, Issue.3
, pp. 335-343
-
-
Haga, W.J.1
Zviran, M.2
-
9
-
-
57649187363
-
Love and Authentication
-
New York, NY, USA, ACM
-
M. Jakobsson, E. Stolterman, S. Wetzel, and L. Yang. Love and Authentication. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 197-200, New York, NY, USA, 2008. ACM.
-
(2008)
CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems
, pp. 197-200
-
-
Jakobsson, M.1
Stolterman, E.2
Wetzel, S.3
Yang, L.4
-
10
-
-
0033281339
-
A Fuzzy Commitment Scheme
-
New York, NY, USA, ACM
-
A. Juels and M. Wattenberg. A Fuzzy Commitment Scheme. In CCS '99: Proceedings of the 6th ACM conference on Computer and communications security, pages 28-36, New York, NY, USA, 1999. ACM.
-
(1999)
CCS '99: Proceedings of the 6th ACM conference on Computer and communications security
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
11
-
-
70349234845
-
-
last retrieved in August 2008
-
www.rsa.com/blog/blog-entry.aspx?id=1152, last retrieved in August 2008.
-
-
-
-
12
-
-
12844256425
-
Designing and Evaluating Challenge-question Systems
-
M. Just. Designing and Evaluating Challenge-question Systems. IEEE Security and Privacy, 2(5):32-39, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 32-39
-
-
Just, M.1
-
13
-
-
43449190224
-
The Stability of Preference Items
-
G. F. Kuder. The Stability of Preference Items. Journal of Social Psychology, pages 41-50, 10 1939.
-
(1939)
Journal of Social Psychology
, vol.10
, pp. 41-50
-
-
Kuder, G.F.1
-
14
-
-
35048883097
-
Call Center Customer Verification by Query-Directed Passwords
-
L. O'Gorman, A. Bagga, and J. L. Bentley. Call Center Customer Verification by Query-Directed Passwords. In Financial Cryptography, pages 54-67, 2004.
-
(2004)
Financial Cryptography
, pp. 54-67
-
-
O'Gorman, L.1
Bagga, A.2
Bentley, J.L.3
-
15
-
-
70349231739
-
-
last retrieved in August 2008
-
www.voiceport.net/PasswordReset.aspx, last retrieved in August 2008.
-
-
-
-
16
-
-
65449137148
-
Personal Knowledge Questions for Fallback Authentication: Security Questions in the Era of Facebook
-
A. Rabkin. Personal Knowledge Questions for Fallback Authentication: Security Questions in the Era of Facebook. In SOUPS, 2008.
-
(2008)
SOUPS
-
-
Rabkin, A.1
-
17
-
-
70349255056
-
-
last retrieved in August 2008
-
www.schneier.com/blog/archives/2005/02/the-curse-of-th.html, last retrieved in August 2008.
-
-
-
-
19
-
-
70349247211
-
-
www2.csoonline.com/article/221068/Strong-Authentication-for-Online- Banking-Success-Factors?page=1, last retrieved in August 2008.
-
www2.csoonline.com/article/221068/Strong-Authentication-for-Online- Banking-Success-Factors?page=1, last retrieved in August 2008.
-
-
-
|