-
2
-
-
7744225385
-
Password-by-number
-
Andress, M. (2002). Password-by-number. InfoWorld, 24, 28.
-
(2002)
InfoWorld
, vol.24
, pp. 28
-
-
Andress, M.1
-
3
-
-
7744228242
-
Passwords reveal your personality
-
Andrews, L. W. (2002). Passwords reveal your personality. Psychology Today, 35, 16.
-
(2002)
Psychology Today
, vol.35
, pp. 16
-
-
Andrews, L.W.1
-
4
-
-
7744237685
-
And the password is... #%?∞!
-
Armstrong, L. (2002). And the password is... #%?∞! Business Week, 3785, 89.
-
(2002)
Business Week
, vol.3785
, pp. 89
-
-
Armstrong, L.1
-
5
-
-
0021470294
-
User-friendly password methods for computer-mediated information systems
-
Barton, B. F., & Barton, M. L. S. (1984). User-friendly password methods for computer-mediated information systems. Computers & Security, 3, 186-195.
-
(1984)
Computers & Security
, vol.3
, pp. 186-195
-
-
Barton, B.F.1
Barton, M.L.S.2
-
6
-
-
7744235306
-
Outdated, insecure passwords are losing money for Internet businesses
-
Bersch, C. (2000). Outdated, insecure passwords are losing money for Internet businesses. Communications News, 37, 10-11.
-
(2000)
Communications News
, vol.37
, pp. 10-11
-
-
Bersch, C.1
-
7
-
-
84984128324
-
Hiding valuables: A questionnaire study of mnemonically risky behavior
-
Brown, A. S., & Rahhal, T. A. (1994). Hiding valuables: a questionnaire study of mnemonically risky behavior. Applied Cognitive Psychology, 8, 141-154.
-
(1994)
Applied Cognitive Psychology
, vol.8
, pp. 141-154
-
-
Brown, A.S.1
Rahhal, T.A.2
-
9
-
-
85084161493
-
Déjà vu: A user study. Using images for authentication
-
Proceedings of the 9th USENIX Security Symposium, Denver, Colorado
-
Dhamija, R., & Perrig, A. (2000). Déjà vu: a user study. Using images for authentication. Proceedings of the 9th USENIX Security Symposium, Denver, Colorado.
-
(2000)
-
-
Dhamija, R.1
Perrig, A.2
-
10
-
-
0026704750
-
Importance of the kind of cue for judgments of learning (JOLs) and the delayed-JOL effect
-
Dunlosky, J., & Nelson, T. O. (1992). Importance of the kind of cue for judgments of learning (JOLs) and the delayed-JOL effect. Memory & Cognition, 20, 374-380.
-
(1992)
Memory & Cognition
, vol.20
, pp. 374-380
-
-
Dunlosky, J.1
Nelson, T.O.2
-
11
-
-
7744226389
-
COMPUTERS - Access control - Passwords
-
Faruki, A. (2003). COMPUTERS - Access control - Passwords. Computing Canada, 29, 8.
-
(2003)
Computing Canada
, vol.29
, pp. 8
-
-
Faruki, A.1
-
12
-
-
0037203606
-
Truffles - Myth or strategic plan?
-
Groves, J. (2002). Truffles - Myth or strategic plan? Computer Fraud & Security, 2002, 9-12.
-
(2002)
Computer Fraud & Security
, vol.2002
, pp. 9-12
-
-
Groves, J.1
-
13
-
-
7744234991
-
A study on the attitude and behavior of computer network users regarding security administration
-
Harada, Y., & Kuroki, K. (1996). A study on the attitude and behavior of computer network users regarding security administration. Reports of National Research Institute of Police Science, 37, 21-33.
-
(1996)
Reports of National Research Institute of Police Science
, vol.37
, pp. 21-33
-
-
Harada, Y.1
Kuroki, K.2
-
14
-
-
7744242520
-
Doing a number on memory
-
1
-
Hébert, R. (2001). Doing a number on memory. APS Observer, 14(7), 1, 7-11.
-
(2001)
APS Observer
, vol.14
, Issue.7
, pp. 7-11
-
-
Hébert, R.1
-
15
-
-
7744225382
-
Top 10 security mistakes
-
Horowitz, A. S. (2001). Top 10 security mistakes. Computerworld, 35, 38.
-
(2001)
Computerworld
, vol.35
, pp. 38
-
-
Horowitz, A.S.1
-
16
-
-
0021399173
-
Self-generated identification codes for anonymous collection of longitudinal questionnaire data
-
Kearney, K. A., Hopkins, R. H., Mauss, A. L., & Weisheit, R. A. (1984). Self-generated identification codes for anonymous collection of longitudinal questionnaire data. Public Opinion Quarterly, 48, 370-378.
-
(1984)
Public Opinion Quarterly
, vol.48
, pp. 370-378
-
-
Kearney, K.A.1
Hopkins, R.H.2
Mauss, A.L.3
Weisheit, R.A.4
-
17
-
-
7744227921
-
Attacking the forgotten password
-
Montgomery, M. A. (2002). Attacking the forgotten password. Book Report, 21, 40.
-
(2002)
Book Report
, vol.21
, pp. 40
-
-
Montgomery, M.A.1
-
19
-
-
84970278517
-
When people's judgments of learning (JOLs) are extremely accurate at predicting subsequent recall: The 'Delayed-JOL Effect'
-
Nelson, T. O., & Dunlosky, J. (1991). When people's judgments of learning (JOLs) are extremely accurate at predicting subsequent recall: the 'Delayed-JOL Effect'. Psychological Science, 2, 267-270.
-
(1991)
Psychological Science
, vol.2
, pp. 267-270
-
-
Nelson, T.O.1
Dunlosky, J.2
-
20
-
-
84965533495
-
How shall we explain the delayed-judgment-of learning effect?
-
Nelson, T. O., & Dunlosky, J. (1992). How shall we explain the delayed-judgment-of learning effect? Psychological Science, 3, 317-318.
-
(1992)
Psychological Science
, vol.3
, pp. 317-318
-
-
Nelson, T.O.1
Dunlosky, J.2
-
21
-
-
0024768109
-
Passwords in use in a university timesharing environment
-
Riddle, B. L., Miron, M. S., & Semo, J. A. (1989). Passwords in use in a university timesharing environment. Computers & Security, 8, 569-579.
-
(1989)
Computers & Security
, vol.8
, pp. 569-579
-
-
Riddle, B.L.1
Miron, M.S.2
Semo, J.A.3
-
22
-
-
7744236768
-
The password plague
-
Spangler, T. (2001). The password plague. Interactive Week, 8, 47.
-
(2001)
Interactive Week
, vol.8
, pp. 47
-
-
Spangler, T.1
-
23
-
-
84965454795
-
When predictions create reality: Judgments of learning may alter what they are intended to assess
-
Spellman, B. A., & Bjork, R. A. (1992). When predictions create reality: judgments of learning may alter what they are intended to assess. Psychological Science, 3, 315-316.
-
(1992)
Psychological Science
, vol.3
, pp. 315-316
-
-
Spellman, B.A.1
Bjork, R.A.2
-
24
-
-
7744239589
-
Passwords may soon be history
-
Wildstrom, S. H. (1999). Passwords may soon be history. Business Week, 3656, 22.
-
(1999)
Business Week
, vol.3656
, pp. 22
-
-
Wildstrom, S.H.1
|