메뉴 건너뛰기




Volumn 18, Issue 6, 2004, Pages 641-651

Generating and remembering passwords

Author keywords

[No Author keywords available]

Indexed keywords

ADULT; ARTICLE; BIRTH; COMPUTER SECURITY; CONTROLLED STUDY; CORRELATION ANALYSIS; DOCUMENTATION; EMPIRICISM; FRIEND; HEALTH SURVEY; HUMAN; HUMAN EXPERIMENT; HUMAN RELATION; INFORMATION PROCESSING; LANGUAGE; MEMORY; PERSONALITY; PRIORITY JOURNAL; RELATIVE; SCIENTIFIC LITERATURE;

EID: 7744227917     PISSN: 08884080     EISSN: None     Source Type: Journal    
DOI: 10.1002/acp.1014     Document Type: Article
Times cited : (141)

References (25)
  • 2
    • 7744225385 scopus 로고    scopus 로고
    • Password-by-number
    • Andress, M. (2002). Password-by-number. InfoWorld, 24, 28.
    • (2002) InfoWorld , vol.24 , pp. 28
    • Andress, M.1
  • 3
    • 7744228242 scopus 로고    scopus 로고
    • Passwords reveal your personality
    • Andrews, L. W. (2002). Passwords reveal your personality. Psychology Today, 35, 16.
    • (2002) Psychology Today , vol.35 , pp. 16
    • Andrews, L.W.1
  • 4
    • 7744237685 scopus 로고    scopus 로고
    • And the password is... #%?∞!
    • Armstrong, L. (2002). And the password is... #%?∞! Business Week, 3785, 89.
    • (2002) Business Week , vol.3785 , pp. 89
    • Armstrong, L.1
  • 5
    • 0021470294 scopus 로고
    • User-friendly password methods for computer-mediated information systems
    • Barton, B. F., & Barton, M. L. S. (1984). User-friendly password methods for computer-mediated information systems. Computers & Security, 3, 186-195.
    • (1984) Computers & Security , vol.3 , pp. 186-195
    • Barton, B.F.1    Barton, M.L.S.2
  • 6
    • 7744235306 scopus 로고    scopus 로고
    • Outdated, insecure passwords are losing money for Internet businesses
    • Bersch, C. (2000). Outdated, insecure passwords are losing money for Internet businesses. Communications News, 37, 10-11.
    • (2000) Communications News , vol.37 , pp. 10-11
    • Bersch, C.1
  • 7
    • 84984128324 scopus 로고
    • Hiding valuables: A questionnaire study of mnemonically risky behavior
    • Brown, A. S., & Rahhal, T. A. (1994). Hiding valuables: a questionnaire study of mnemonically risky behavior. Applied Cognitive Psychology, 8, 141-154.
    • (1994) Applied Cognitive Psychology , vol.8 , pp. 141-154
    • Brown, A.S.1    Rahhal, T.A.2
  • 9
    • 85084161493 scopus 로고    scopus 로고
    • Déjà vu: A user study. Using images for authentication
    • Proceedings of the 9th USENIX Security Symposium, Denver, Colorado
    • Dhamija, R., & Perrig, A. (2000). Déjà vu: a user study. Using images for authentication. Proceedings of the 9th USENIX Security Symposium, Denver, Colorado.
    • (2000)
    • Dhamija, R.1    Perrig, A.2
  • 10
    • 0026704750 scopus 로고
    • Importance of the kind of cue for judgments of learning (JOLs) and the delayed-JOL effect
    • Dunlosky, J., & Nelson, T. O. (1992). Importance of the kind of cue for judgments of learning (JOLs) and the delayed-JOL effect. Memory & Cognition, 20, 374-380.
    • (1992) Memory & Cognition , vol.20 , pp. 374-380
    • Dunlosky, J.1    Nelson, T.O.2
  • 11
    • 7744226389 scopus 로고    scopus 로고
    • COMPUTERS - Access control - Passwords
    • Faruki, A. (2003). COMPUTERS - Access control - Passwords. Computing Canada, 29, 8.
    • (2003) Computing Canada , vol.29 , pp. 8
    • Faruki, A.1
  • 12
    • 0037203606 scopus 로고    scopus 로고
    • Truffles - Myth or strategic plan?
    • Groves, J. (2002). Truffles - Myth or strategic plan? Computer Fraud & Security, 2002, 9-12.
    • (2002) Computer Fraud & Security , vol.2002 , pp. 9-12
    • Groves, J.1
  • 13
    • 7744234991 scopus 로고    scopus 로고
    • A study on the attitude and behavior of computer network users regarding security administration
    • Harada, Y., & Kuroki, K. (1996). A study on the attitude and behavior of computer network users regarding security administration. Reports of National Research Institute of Police Science, 37, 21-33.
    • (1996) Reports of National Research Institute of Police Science , vol.37 , pp. 21-33
    • Harada, Y.1    Kuroki, K.2
  • 14
    • 7744242520 scopus 로고    scopus 로고
    • Doing a number on memory
    • 1
    • Hébert, R. (2001). Doing a number on memory. APS Observer, 14(7), 1, 7-11.
    • (2001) APS Observer , vol.14 , Issue.7 , pp. 7-11
    • Hébert, R.1
  • 15
    • 7744225382 scopus 로고    scopus 로고
    • Top 10 security mistakes
    • Horowitz, A. S. (2001). Top 10 security mistakes. Computerworld, 35, 38.
    • (2001) Computerworld , vol.35 , pp. 38
    • Horowitz, A.S.1
  • 16
    • 0021399173 scopus 로고
    • Self-generated identification codes for anonymous collection of longitudinal questionnaire data
    • Kearney, K. A., Hopkins, R. H., Mauss, A. L., & Weisheit, R. A. (1984). Self-generated identification codes for anonymous collection of longitudinal questionnaire data. Public Opinion Quarterly, 48, 370-378.
    • (1984) Public Opinion Quarterly , vol.48 , pp. 370-378
    • Kearney, K.A.1    Hopkins, R.H.2    Mauss, A.L.3    Weisheit, R.A.4
  • 17
    • 7744227921 scopus 로고    scopus 로고
    • Attacking the forgotten password
    • Montgomery, M. A. (2002). Attacking the forgotten password. Book Report, 21, 40.
    • (2002) Book Report , vol.21 , pp. 40
    • Montgomery, M.A.1
  • 19
    • 84970278517 scopus 로고
    • When people's judgments of learning (JOLs) are extremely accurate at predicting subsequent recall: The 'Delayed-JOL Effect'
    • Nelson, T. O., & Dunlosky, J. (1991). When people's judgments of learning (JOLs) are extremely accurate at predicting subsequent recall: the 'Delayed-JOL Effect'. Psychological Science, 2, 267-270.
    • (1991) Psychological Science , vol.2 , pp. 267-270
    • Nelson, T.O.1    Dunlosky, J.2
  • 20
    • 84965533495 scopus 로고
    • How shall we explain the delayed-judgment-of learning effect?
    • Nelson, T. O., & Dunlosky, J. (1992). How shall we explain the delayed-judgment-of learning effect? Psychological Science, 3, 317-318.
    • (1992) Psychological Science , vol.3 , pp. 317-318
    • Nelson, T.O.1    Dunlosky, J.2
  • 21
    • 0024768109 scopus 로고
    • Passwords in use in a university timesharing environment
    • Riddle, B. L., Miron, M. S., & Semo, J. A. (1989). Passwords in use in a university timesharing environment. Computers & Security, 8, 569-579.
    • (1989) Computers & Security , vol.8 , pp. 569-579
    • Riddle, B.L.1    Miron, M.S.2    Semo, J.A.3
  • 22
    • 7744236768 scopus 로고    scopus 로고
    • The password plague
    • Spangler, T. (2001). The password plague. Interactive Week, 8, 47.
    • (2001) Interactive Week , vol.8 , pp. 47
    • Spangler, T.1
  • 23
    • 84965454795 scopus 로고
    • When predictions create reality: Judgments of learning may alter what they are intended to assess
    • Spellman, B. A., & Bjork, R. A. (1992). When predictions create reality: judgments of learning may alter what they are intended to assess. Psychological Science, 3, 315-316.
    • (1992) Psychological Science , vol.3 , pp. 315-316
    • Spellman, B.A.1    Bjork, R.A.2
  • 24
    • 7744239589 scopus 로고    scopus 로고
    • Passwords may soon be history
    • Wildstrom, S. H. (1999). Passwords may soon be history. Business Week, 3656, 22.
    • (1999) Business Week , vol.3656 , pp. 22
    • Wildstrom, S.H.1
  • 25


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.