-
1
-
-
34547363189
-
Fourth-factor authentication: Somebody you know
-
New York, NY, USA, ACM
-
J. Brainard, A. Juels, R. L. Rivest, M. Szydlo, and M. Yung. Fourth-factor authentication: somebody you know. In CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security, pages 168-178, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 168-178
-
-
Brainard, J.1
Juels, A.2
Rivest, R.L.3
Szydlo, M.4
Yung, M.5
-
3
-
-
84869688764
-
-
CommonwealthBank. NetBank NetCode SMS, 2008. http://www.commbank.com.au/ netbank/netcodesms/.
-
(2008)
NetBank NetCode SMS
-
-
-
4
-
-
57649187363
-
Love and authentication
-
New York, NY, USA, ACM
-
M. Jakobsson, E. Stolterman, S. Wetzel, and L. Yang. Love and authentication. In CHI '08: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems, pages 197-200, New York, NY, USA, 2008. ACM.
-
(2008)
CHI '08: Proceeding of the Twenty-sixth Annual SIGCHI Conference on Human Factors in Computing Systems
, pp. 197-200
-
-
Jakobsson, M.1
Stolterman, E.2
Wetzel, S.3
Yang, L.4
-
5
-
-
70449654857
-
Designing authentication systems with challenge questions
-
In L. F. Cranor and S. Garfinkel, editors, Sebastopol, CA, O'Reilly Media, Inc
-
M. Just. Designing authentication systems with challenge questions. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, pages 143-155, Sebastopol, CA, 2005. O'Reilly Media, Inc.
-
(2005)
Security and Usability: Designing Secure Systems that People Can Use
, pp. 143-155
-
-
Just, M.1
-
8
-
-
84869670669
-
-
H. P. Ltd
-
H. P. Ltd. Top 20 websites, 2008. http://www.hitwise.com/datacenter/ rankings.php.
-
(2008)
Top 20 Websites
-
-
-
9
-
-
84869676744
-
-
May
-
Microsoft Corporation. Windows live hotmail fact sheet, May 2007. http://www.microsoft.com/presspass/newsroom/msn/factsheet/hotmail.mspx.
-
(2007)
Windows Live Hotmail Fact Sheet
-
-
-
10
-
-
84985933266
-
Cost-effective computer security: Cognitive and associative passwords
-
Washington, DC, USA, IEEE Computer Society
-
J. Podd, J. Bunnell, and R. Henderson. Cost-effective computer security: Cognitive and associative passwords. In OZCHI '96: Proceedings of the 6th Australian Conference on Computer-Human Interaction (OZCHI '96), page 304, Washington, DC, USA, 1996. IEEE Computer Society.
-
(1996)
OZCHI '96: Proceedings of the 6th Australian Conference on Computer-human Interaction (OZCHI '96)
, pp. 304
-
-
Podd, J.1
Bunnell, J.2
Henderson, R.3
-
11
-
-
65449137148
-
Personal knowledge questions for fallback authentication: Security questions in the era of facebook
-
New York, NY, USA, ACM
-
A. Rabkin. Personal knowledge questions for fallback authentication: security questions in the era of facebook. In SOUPS '08: Proceedings of the 4th Symposium on Usable Privacy and Security, pages 13- 23, New York, NY, USA, 2008. ACM.
-
(2008)
SOUPS '08: Proceedings of the 4th Symposium on Usable Privacy and Security
, pp. 13-23
-
-
Rabkin, A.1
-
12
-
-
84892469732
-
It's not what you know, but who you know: A social approach to last-resort authentication
-
Boston, MA, ACM
-
S. Schechter, S. Egelman, and R. W. Reeder. It's not what you know, but who you know: A social approach to last-resort authentication. In CHI '09: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, Boston, MA, 2009. ACM.
-
(2009)
CHI '09: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems
-
-
Schechter, S.1
Egelman, S.2
Reeder, R.W.3
-
13
-
-
34548786769
-
The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
Washington, DC, USA, May 20-23, IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 51- 65, Washington, DC, USA, May 20-23 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
14
-
-
70350714665
-
What would you do if you logged onto your e-mail and received an unfamiliar message: 'User name and password do not match'?
-
Oct. 4
-
R. Stross. What would you do if you logged onto your e-mail and received an unfamiliar message: 'user name and password do not match'? The New York Times, Oct. 4, 2008. http://www.nytimes.com/2008/10/05/business/05digi.html.
-
(2008)
The New York Times
-
-
Stross, R.1
-
15
-
-
84869690470
-
'Forgot your password?' may be weakest link
-
Aug. 26
-
B. Sullivan. 'forgot your password?' may be weakest link. MSNBC Red Tape Chronicles, Aug. 26, 2008. http://redtape.msnbc.com/2008/08/almosteveryone.html.
-
(2008)
MSNBC Red Tape Chronicles
-
-
Sullivan, B.1
-
16
-
-
57649224026
-
Access control by testing for shared knowledge
-
Florence, Italy, ACM
-
M. Toomim, X. Zhang, J. Fogarty, and J. A. Landay. Access control by testing for shared knowledge. In CHI '08: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, Florence, Italy, 2008. ACM.
-
(2008)
CHI '08: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems
-
-
Toomim, M.1
Zhang, X.2
Fogarty, J.3
Landay, J.A.4
-
17
-
-
0025497417
-
User authentication by cognitive passwords: An empirical assessment
-
Los Alamitos, CA, USA, IEEE Computer Society Press
-
M. Zviran and W. J. Haga. User authentication by cognitive passwords: an empirical assessment. In JCIT: Proceedings of the Fifth Jerusalem Conference on Information technology, pages 137-144, Los Alamitos, CA, USA, 1990. IEEE Computer Society Press.
-
(1990)
JCIT: Proceedings of the Fifth Jerusalem Conference on Information Technology
, pp. 137-144
-
-
Zviran, M.1
Haga, W.J.2
|