-
1
-
-
77956260256
-
-
http://www.internetworldstats.com.
-
-
-
-
2
-
-
77956260126
-
-
http://www.worldmapper.org/display.php?selected=336.
-
-
-
-
3
-
-
77956237167
-
-
http://www.openwall.com/john/.
-
-
-
-
4
-
-
77956248559
-
-
Regulation E of the Federal Reserve Board. http://ecfr.gpoaccess.gov/cgi/ t/text/text-idx?c=ecfr&sid=0283a311c8b13f29f284816d4dc5aeb7&rgn= div9&view=text&node=12:2.0.1.1.6.0.3.19.14&idno=12.
-
Regulation e of the Federal Reserve Board
-
-
-
6
-
-
77956240595
-
-
Wells Fargo: Online Security Guarantee. https://www.wellsfargo.com/ privacy-security/online/guarantee.
-
-
-
-
7
-
-
77956247217
-
-
Wired: Weak Password Brings 'Happiness' to Twitter Hacker. http://blog.wired.com/27bstroke6/2009/01/professed-twitt.html.
-
-
-
-
8
-
-
77956234268
-
-
Department of Defense Password Management Guideline U.S. Dept. of Defense, Computer Security Center
-
Department of Defense Password Management Guideline. Technical Report CSC-STD-002-85, U.S. Dept. of Defense, Computer Security Center, 1985.
-
(1985)
Technical Report CSC-STD-002-85
-
-
-
10
-
-
70350697293
-
The compliance budget: Managing security behaviour in organisations
-
A. Beautement, M.A. Sasse and M. Wonham. The Compliance Budget: Managing Security Behaviour in Organisations. NSPW, 2008.
-
(2008)
NSPW
-
-
Beautement, A.1
Sasse, M.A.2
Wonham, M.3
-
11
-
-
0043232732
-
Users are not the enemy
-
A. Adams and M. A. Sasse. Users Are Not the Enemy. Commun. ACM, 42(12), 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
-
-
Adams, A.1
Sasse, M.A.2
-
12
-
-
77956252482
-
-
Avira TechBlog. The Most Phished Brands of 2009. http://techblog.avira. com/2009/12/19/the-most-phished-brands-of-2009/en/.
-
The Most Phished Brands of 2009
-
-
-
14
-
-
70849087587
-
The way I see it: When security gets in the way
-
D.A. Norman. The Way I See It: When security gets in the way. Interactions, 16(6):60-63, 2009.
-
(2009)
Interactions
, vol.16
, Issue.6
, pp. 60-63
-
-
Norman, D.A.1
-
17
-
-
77956241508
-
-
Federal Financial Institutions Examination Council. Top 50 Bank Holding Companies 2009. http://www.ffiec.gov/nicpubweb/nicweb/Top50form.aspx.
-
(2009)
Top 50 Bank Holding Companies
-
-
-
18
-
-
35348884906
-
A large-scale study of web password habits
-
Banff
-
D. Florêncio and C. Herley. A Large-Scale Study of Web Password Habits. WWW 2007, Banff.
-
(2007)
WWW
-
-
Florêncio, D.1
Herley, C.2
-
19
-
-
48049095953
-
Stopping phishing attacks even when the victims ignore warnings
-
D. Florêncio and C. Herley. Stopping Phishing Attacks Even when the Victims Ignore Warnings. MSR Tech. Report, 2005.
-
(2005)
MSR Tech. Report
-
-
Florêncio, D.1
Herley, C.2
-
20
-
-
77956250255
-
KLASSP: Entering passwords on a spyware infected machine
-
D. Florêncio and C. Herley. KLASSP: Entering Passwords on a Spyware Infected Machine. ACSAC, 2006.
-
(2006)
ACSAC
-
-
Florêncio, D.1
Herley, C.2
-
23
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
Oxford
-
C. Herley. So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. NSPW 2009, Oxford.
-
(2009)
NSPW
-
-
Herley, C.1
-
24
-
-
84856038557
-
A profitless endeavor: Phishing as tragedy of the commons
-
Lake Tahoe, CA
-
C. Herley and D. Florêncio. A Profitless Endeavor: Phishing as Tragedy of the Commons. NSPW 2008, Lake Tahoe, CA.
-
(2008)
NSPW
-
-
Herley, C.1
Florêncio, D.2
-
25
-
-
81255149250
-
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
-
London
-
C. Herley and D. Florêncio. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. WEIS 2009, London.
-
(2009)
WEIS
-
-
Herley, C.1
Florêncio, D.2
-
29
-
-
77956251589
-
The password thicket: Technical and market failures in human authentication on the web
-
J. Bonneau and S. Preibusch. The Password Thicket: technical and Market Failures in Human Authentication on the Web. WEIS, 2010.
-
(2010)
WEIS
-
-
Bonneau, J.1
Preibusch, S.2
-
30
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
J. Franklin and V. Paxson and A. Perrig and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. Proc. CCS, 2007.
-
(2007)
Proc. CCS
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
33
-
-
70450257560
-
Security and usability: The gap in real-world online banking
-
M. Mannan and P.C. van Oorschot. Security and Usability: The Gap in Real-World Online Banking. NSPW, 2007.
-
(2007)
NSPW
-
-
Mannan, M.1
Van Oorschot, P.C.2
-
34
-
-
0035387175
-
Transforming the "weakest link": A human-computer interaction approach to usable and effective security
-
M.A. Sasse, S. Brostoff and D. Weirich. Transforming the "weakest link": a human-computer interaction approach to usable and effective security. In BT Technology Journal, 2001.
-
(2001)
BT Technology Journal
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
37
-
-
77953963809
-
The true cost of unusable password policies: Password use in the wild
-
P. Inglesant and M. A. Sasse. The True Cost of Unusable Password Policies: Password use in the Wild. CHI, 2010.
-
(2010)
CHI
-
-
Inglesant, P.1
Sasse, M.A.2
-
38
-
-
33750906057
-
On countering online dictionary attacks with login histories and humans-in-the-loop
-
P.C. van Oorschot, S. Stubblebine. On Countering Online Dictionary Attacks with Login Histories and Humans-in-the-Loop. ACM TISSEC vol. 9 issue 3, 2006.
-
(2006)
ACM TISSEC
, vol.9
, Issue.3
-
-
Van Oorschot, P.C.1
Stubblebine, S.2
-
41
-
-
35248846782
-
Password management strategies for online accounts
-
S. Gaw and E.W. Felten. Password Management Strategies for Online Accounts. Proc. SOUPS.
-
Proc. SOUPS
-
-
Gaw, S.1
Felten, E.W.2
|