-
1
-
-
0043232732
-
Users are not the enemy
-
December
-
A. Adams and M. A. Sasse. Users are not the enemy. Comm. ACM, 42(12):40-46, December 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
78650027619
-
Defense of password expiration
-
April as of March 28 2010
-
S. Alexander, Jr. In defense of password expiration. Post to LOPSA blog, April 2006. http://lopsa.org/node/295 as of March 28, 2010.
-
(2006)
Post to LOPSA Blog
-
-
Alexander Jr., S.1
-
3
-
-
33144475034
-
Unconventional wisdom
-
January-February
-
S. M. Bellovin. Unconventional wisdom. IEEE Security & Privacy, 4(1), January-February 2006.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.1
-
-
Bellovin, S.M.1
-
6
-
-
78650026170
-
-
W. E. Burr, D. F. Dodson, W. T. Polk, P. J. Bond, and A. L. Bement. NIST special publication 800-63, version 1.0.1, 2004
-
W. E. Burr, D. F. Dodson, W. T. Polk, P. J. Bond, and A. L. Bement. NIST special publication 800-63, version 1.0.1, 2004.
-
-
-
-
7
-
-
74049149728
-
Multiple password interference in text passwords and click-based graphical passwords
-
November
-
S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle. Multiple password interference in text passwords and click-based graphical passwords. In 16th ACM Conference on Computer and Communications Security, pages 500-511, November 2009.
-
(2009)
16th ACM Conference on Computer and Communications Security
, pp. 500-511
-
-
Chiasson, S.1
Forget, A.2
Stobert, E.3
Van Oorschot, P.C.4
Biddle, R.5
-
8
-
-
33847272670
-
The string edit distance matching problem with moves
-
February
-
G. Cormode and S. Muthukrishnan. The string edit distance matching problem with moves. ACM Transactions on Algorithms, 3:1-19, February 2007.
-
(2007)
ACM Transactions on Algorithms
, vol.3
, pp. 1-19
-
-
Cormode, G.1
Muthukrishnan, S.2
-
9
-
-
67549108038
-
How crackers crack passwords or what passwords to avoid
-
USENIX, August
-
A. M. De Alvare. How crackers crack passwords or what passwords to avoid. In Second Security Workshop Program, pages 103-112. USENIX, August 1990.
-
(1990)
Second Security Workshop Program
, pp. 103-112
-
-
De Alvare, A.M.1
-
11
-
-
21044440739
-
Approximating min sum set cover
-
U. Feige, L. Lovász, and P. Tetali. Approximating min sum set cover. Algorithmica, 40:219-234, 2004.
-
(2004)
Algorithmica
, vol.40
, pp. 219-234
-
-
Feige, U.1
Lovász, L.2
Tetali, P.3
-
12
-
-
35348884906
-
A large-scale study of web password habits
-
May
-
D. Florêncio and C. Herley. A large-scale study of web password habits. In WWW 2007, May 2007.
-
(2007)
WWW 2007
-
-
Florêncio, D.1
Herley, C.2
-
14
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
USENIX, August
-
D. V. Klein. Foiling the cracker: A survey of, and improvements to, password security. In Second Security Workshop Program, pages 5-14. USENIX, August 1990.
-
(1990)
Second Security Workshop Program
, pp. 5-14
-
-
Klein, D.V.1
-
15
-
-
34250767745
-
Human selection of mnemonic phrase-based passwords
-
July
-
C. Kuo, S. Romanosky, and L. F. Cranor. Human selection of mnemonic phrase-based passwords. In SOUPS, pages 67-78, July 2006.
-
(2006)
SOUPS
, pp. 67-78
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
16
-
-
33646700923
-
Managing multiple passwords and multiple logins: MiFA minimal-feedback hints for remote authentication
-
B. Lu and M. B. Twidale. Managing multiple passwords and multiple logins: MiFA minimal-feedback hints for remote authentication. In IFIP INTERACT 2003 Conference, pages 821-824, 2003.
-
(2003)
IFIP INTERACT 2003 Conference
, pp. 821-824
-
-
Lu, B.1
Twidale, M.B.2
-
18
-
-
0018543411
-
Password security: A case history
-
November
-
R. Morris and K. Thompson. Password security: A case history. Comm. ACM, 22:594-597, November 1979.
-
(1979)
Comm. ACM
, vol.22
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
20
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
August
-
P. Oechslin. Making a faster cryptanalytic time-memory trade-off. In Advances in Cryptology - CRYPTO 2003, pages 617-630, August 2003.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, pp. 617-630
-
-
Oechslin, P.1
-
21
-
-
12844251094
-
Letter to comm. ACM
-
April
-
B. Patterson. Letter to Comm. ACM. Comm. ACM, 43(4):11-12, April 2000.
-
(2000)
Comm. ACM
, vol.43
, Issue.4
, pp. 11-12
-
-
Patterson, B.1
-
22
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
July
-
R. Shay, S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor. Encountering stronger password requirements: User attitudes and behaviors. In 6th Symposium on Usable Privacy and Security, July 2010.
-
(2010)
6th Symposium on Usable Privacy and Security
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
Leon, P.G.4
Mazurek, M.L.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
-
23
-
-
0026869371
-
Opus: Preventing weak password choices
-
E. H. Spafford. Opus: Preventing weak password choices. Computers & Security, 11:273-278, 1991.
-
(1991)
Computers & Security
, vol.11
, pp. 273-278
-
-
Spafford, E.H.1
-
24
-
-
78649998898
-
Security myths and passwords
-
April as of March 28, 2010
-
G. Spafford. Security myths and passwords. Post to CERIAS blog, April 2006. http://www.cerias.purdue.edu/ site/blog/post/password-change-myths/ as of March 28, 2010.
-
(2006)
Post to CERIAS Blog
-
-
Spafford, G.1
-
25
-
-
17844366573
-
Analysis of end user security behaviors
-
J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton. Analysis of end user security behaviors. Computers & Security, 24(2):124-133, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
26
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
May
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek. Password cracking using probabilistic context-free grammars. In 2009 IEEE Symposium on Security and Privacy, pages 391-405, May 2009.
-
(2009)
2009 IEEE Symposium on Security and Privacy
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
27
-
-
0242708748
-
A note on proactive password checking
-
J. Yan. A note on proactive password checking. In ACM New Security Paradigms Workshop, pages 127-135, 2001.
-
(2001)
ACM New Security Paradigms Workshop
, pp. 127-135
-
-
Yan, J.1
-
28
-
-
67650156801
-
Improving multiple-password recall: An empirical study
-
J. Zhang, X. Luo, S. Akkaladevi, and J. Ziegelmayer. Improving multiple-password recall: an empirical study. European Journal of Information Systems, pages 1-12, 2009.
-
(2009)
European Journal of Information Systems
, pp. 1-12
-
-
Zhang, J.1
Luo, X.2
Akkaladevi, S.3
Ziegelmayer, J.4
|