-
1
-
-
9544226886
-
A piece of yourself: Ethical issues in biometric identification
-
doi:10.1023/B:ETIN.0000006918.22060.1f
-
Alterman, A. (2003). A piece of yourself: Ethical issues in biometric identification. Ethics and Information Technology, 5(3), 139-150. doi:10.1023/B:ETIN.0000006918.22060.1f
-
(2003)
Ethics and Information Technology
, vol.5
, Issue.3
, pp. 139-150
-
-
Alterman, A.1
-
3
-
-
0142253852
-
ADAM: A testbed for exploring the use of data mining in intrusion detection
-
Barbará, D., Couto, J., Jajodia, S., & Wu, N. (2001). ADAM: A testbed for exploring the use of data mining in intrusion detection. SIGMOD Record, 30(4), 15-24. (Pubitemid 33720995)
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 15-24
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Wu, N.4
-
4
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
McDonald, S., Waern, Y., & Cockton, G. Eds., Sunderland, UK: Springer
-
Brostoff, S., & Sasse, M. A. (2000). Are passfaces more usable than passwords? A field trial investigation. In McDonald, S., Waern, Y., & Cockton, G. (Eds.), People and Computers XIV - Usability or Else! Proceedings of HCI 2000 (pp. 405-424). Sunderland, UK: Springer.
-
(2000)
People and Computers XIV - Usability Or Else! Proceedings of HCI 2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
5
-
-
0031373072
-
Cognitive, associative and conventional passwords: Recall and guessing rates
-
PII S0167404897000084
-
Bunnell, J., Podd, J., Henderson, R., Napier, R., & Kennedy-Moffat, J. (1997). Cognitive, associative and conventional passwords: Recall and guessing rates. Computers & Security, 16(7), 629-641. doi:10.1016/S0167-4048 (97) 00008-4 (Pubitemid 127379008)
-
(1997)
Computers and Security
, vol.16
, Issue.7
, pp. 629-641
-
-
Bunnell, J.1
Podd, J.2
Henderson, R.3
Napier, R.4
Kennedy-Moffat, J.5
-
6
-
-
18544374846
-
Evaluation of the human impact of password authentication practices on information security
-
Carstens, D. S., McCauley-Bell, P. R., Malone, L. C., & DeMara, R. F. (2004). Evaluation of the human impact of password authentication practices on information security. Information Science Journal, 7(1), 67-85. (Pubitemid 40659984)
-
(2004)
Informing Science
, vol.7
, pp. 67-85
-
-
Carstens, D.S.1
McCauley-Bell, P.R.2
Malone, L.C.3
DeMara, R.F.4
-
7
-
-
67649529385
-
Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
-
doi:10.1287/isre.1080.0180
-
Cavusoglu, H., Raghunathan, S., & Cavusoglu, H. (2009). Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, 20(2), 198-217. doi:10.1287/isre.1080.0180
-
(2009)
Information Systems Research
, vol.20
, Issue.2
, pp. 198-217
-
-
Cavusoglu, H.1
Raghunathan, S.2
Cavusoglu, H.3
-
8
-
-
0029213708
-
Perceived acceptability of biometric security systems
-
doi:10.1016/0167-4048 95 00005-S
-
Deane, F., Barrelle, K., Henderson, R., & Mahar, D. (1995). Perceived acceptability of biometric security systems. Computers & Security, 14(3), 225-231. doi:10.1016/0167-4048 (95) 00005-S
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 225-231
-
-
Deane, F.1
Barrelle, K.2
Henderson, R.3
Mahar, D.4
-
9
-
-
79956129487
-
Authentication methods for computer systems security
-
Khosrow-Pour, M. Ed., 2nd ed., Hershey, PA: Information Science Reference
-
Erlich, Z., & Zviran, M. (2009). Authentication methods for computer systems security. In Khosrow-Pour, M. (Ed.), Encyclopedia of information science and technology (2nd ed., Vol. 1, pp. 288-293). Hershey, PA: Information Science Reference.
-
(2009)
Encyclopedia of Information Science and Technology
, vol.1
, pp. 288-293
-
-
Erlich, Z.1
Zviran, M.2
-
10
-
-
0033633028
-
Authentication and supervision: A survey of user attitudes
-
doi:10.1016/S0167-4048 00 06027-2
-
Furnell, S. M., Dowland, P. S., Illingworth, H. M., & Reynolds, P. L. (2000). Authentication and supervision: A survey of user attitudes. Computers & Security, 19(6), 529-539. doi:10.1016/S0167-4048 (00) 06027-2
-
(2000)
Computers & Security
, vol.19
, Issue.6
, pp. 529-539
-
-
Furnell, S.M.1
Dowland, P.S.2
Illingworth, H.M.3
Reynolds, P.L.4
-
11
-
-
3943091225
-
A long-term trial of alternative user authentication technologies
-
doi:10.1108/09685220410530816
-
Furnell, S. M., Papadopoulos, I., & Dowland, P. S. (2004). A long-term trial of alternative user authentication technologies. Information Management & Computer Security, 12(2), 178-190. doi:10.1108/ 09685220410530816
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.2
, pp. 178-190
-
-
Furnell, S.M.1
Papadopoulos, I.2
Dowland, P.S.3
-
12
-
-
33947692292
-
Analysis of active intrusion prevention data for predicting hostile activity in computer networks
-
DOI 10.1145/1232743.1232749
-
Green, I., Raz, T., & Zviran, M. (2007). Analysis of active intrusion prevention data for predicting hostile activity in computer networks. Communications of the ACM, 50(4), 63-68. doi:10.1145/1232743.1232749 (Pubitemid 46494529)
-
(2007)
Communications of the ACM
, vol.50
, Issue.4
, pp. 63-68
-
-
Green, I.1
Raz, T.2
Zviran, M.3
-
13
-
-
0347656710
-
Understanding users' keystroke patterns for computer access security
-
doi:10.1016/S0167-4048 03 00010-5
-
Guven, A., & Sogukpinar, I. (2003). Understanding users' keystroke patterns for computer access security. Computers & Security, 22(8), 695-706. doi:10.1016/S0167-4048 (03) 00010-5
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 695-706
-
-
Guven, A.1
Sogukpinar, I.2
-
14
-
-
0005661981
-
Question-andanswer passwords: An empirical evaluation
-
doi:10.1016/0306-4379 91 90005-T
-
Haga, W. J., & Zviran, M. (1991). Question-andanswer passwords: An empirical evaluation. Information Systems, 16(3), 335-343. doi:10.1016/0306-4379 (91) 90005-T
-
(1991)
Information Systems
, vol.16
, Issue.3
, pp. 335-343
-
-
Haga, W.J.1
Zviran, M.2
-
15
-
-
4243096135
-
The domino effect of password reuse
-
doi:10.1145/975817.975820
-
Ives, B., Walsh, K. R., & Schneider, H. (2004). The domino effect of password reuse. Communications of the ACM, 47(4), 75-78. doi:10.1145/975817. 975820
-
(2004)
Communications of the ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
16
-
-
0002326595
-
Biometric identification
-
doi:10.1145/328236.328110
-
Jain, A. K., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), 90-98. doi:10.1145/328236. 328110
-
(2000)
Communications of the ACM
, vol.43
, Issue.2
, pp. 90-98
-
-
Jain, A.K.1
Hong, L.2
Pankanti, S.3
-
17
-
-
1542335451
-
Efficient password authenticated key agreement using smart cards
-
doi:10.1016/j.cose.2003.11.005
-
Juang, W. S. (2004). Efficient password authenticated key agreement using smart cards. Computers & Security, 23(2), 167-173. doi:10.1016/j.cose.2003. 11.005
-
(2004)
Computers & Security
, vol.23
, Issue.2
, pp. 167-173
-
-
Juang, W.S.1
-
18
-
-
0029214744
-
Biometrics, is it a viable proposition for identity authentication and access control?
-
doi:10.1016/0167-4048 95 97054-E
-
Kim, H. J. (1995). Biometrics, is it a viable proposition for identity authentication and access control? Computers & Security, 14(3), 205-214. doi:10.1016/0167-4048 (95) 97054-E
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 205-214
-
-
Kim, H.J.1
-
19
-
-
1942423677
-
Weaknesses and improvements of an efficient password based user authentication scheme using smart cards
-
doi:10.1109/TCE.2004.1277863
-
Ku, W.-C., & Chen, S.-M. (2004). Weaknesses and improvements of an efficient password based user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 50(1), 204-207. doi:10.1109/TCE.2004. 1277863
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.-C.1
Chen, S.-M.2
-
20
-
-
0019634370
-
Password authentication with insecure communication
-
DOI 10.1145/358790.358797
-
Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770-772. doi:10.1145/358790.358797 (Pubitemid 12462508)
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport Leslie1
-
21
-
-
8344266879
-
Authentication and authorization infrastructures (AAIS): A comparative survey
-
doi:10.1016/j.cose.2004.06.013
-
Lopez, J., Oppliger, R., & Pernul, G. (2004). Authentication and authorization infrastructures (AAIS): A comparative survey. Computers & Security, 23(7), 578-590. doi:10.1016/j.cose.2004.06.013
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
22
-
-
0033706859
-
A biometric standard for information management and security
-
doi:10.1016/S0167-4048 00 05029-X
-
Matyas, S. M., & Stapleton, J. (2000). A biometric standard for information management and security. Computers & Security, 19(5), 428-441. doi:10.1016/S0167-4048 (00) 05029-X
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 428-441
-
-
Matyas, S.M.1
Stapleton, J.2
-
23
-
-
0023995273
-
Understanding the use of passwords
-
doi:10.1016/0167-4048 88 90325-2
-
Menkus, B. (1988). Understanding the use of passwords. Computers & Security, 7(2), 132-136. doi:10.1016/0167-4048 (88) 90325-2
-
(1988)
Computers & Security
, vol.7
, Issue.2
, pp. 132-136
-
-
Menkus, B.1
-
24
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
doi:10.1109/JPROC.2003.819605
-
O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12), 2019-2040. doi:10.1109/JPROC.2003.819605
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2019-2040
-
-
O'Gorman, L.1
-
25
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
doi:10.1109/MSECP.2003.1193209
-
Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security and Privacy Magazine, 1(2), 33-42. doi:10.1109/MSECP.2003.1193209
-
(2003)
IEEE Security and Privacy Magazine
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
26
-
-
84896922854
-
Philosophical survey of passwords
-
Qureshi, M., Younus, A., & Khan, A. A. (2009). Philosophical survey of passwords. International Journal of Computer Science Issues, 1, 8-12.
-
(2009)
International Journal of Computer Science Issues
, vol.1
, pp. 8-12
-
-
Qureshi, M.1
Younus, A.2
Khan, A.A.3
-
29
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
DOI 10.1023/A:1011902718709
-
Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the 'weakest link': A human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3), 122-131. doi:10.1023/A:1011902718709 (Pubitemid 32903117)
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
30
-
-
40149101270
-
Artificial immune systems in the context of misbehavior detection
-
DOI 10.1080/01969720701853434, PII 791058237
-
Schaust, S., & Szczerbicka, H. (2008). Artificial immune systems in the context of misbehavior detection. Cybernetics and Systems, 39(2), 136-154. doi:10.1080/01969720701853434 (Pubitemid 351327108)
-
(2008)
Cybernetics and Systems
, vol.39
, Issue.2
, pp. 136-154
-
-
Schaust, S.1
Szczerbicka, H.2
-
31
-
-
0025840878
-
A dynamic password authentication method using a one-way function
-
doi:10.1002/scj.4690220704
-
Shimizu, A. (2007). A dynamic password authentication method using a one-way function. Systems and Computers in Japan, 22(7), 32-40. doi:10.1002/scj.4690220704
-
(2007)
Systems and Computers in Japan
, vol.22
, Issue.7
, pp. 32-40
-
-
Shimizu, A.1
-
34
-
-
0028406329
-
Pass-sentence: A new approach to computer code
-
doi:10.1016/0167-4048 94 90064-7
-
Spector, Y., & Ginzberg, J. (1994). Pass-sentence: A new approach to computer code. Computers & Security, 13(2), 145-160. doi:10.1016/0167-4048 (94) 90064-7
-
(1994)
Computers & Security
, vol.13
, Issue.2
, pp. 145-160
-
-
Spector, Y.1
Ginzberg, J.2
-
35
-
-
0028407392
-
Smartcards: A security assessment
-
doi:10.1016/0167-4048 94 90056-6
-
Svigals, J. (1994). Smartcards: A security assessment. Computers & Security, 13(2), 107-114. doi:10.1016/0167-4048 (94) 90056-6
-
(1994)
Computers & Security
, vol.13
, Issue.2
, pp. 107-114
-
-
Svigals, J.1
-
37
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
Tsai, C.-S., Lee, C.-C., & Hwang, M.-S. (2006). Password authentication schemes: Current status and key issues. International Journal of Network Security, 3(2), 101-115.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.-S.1
Lee, C.-C.2
Hwang, M.-S.3
-
38
-
-
26444578644
-
-
Eds., New York: Springer
-
Wayman, J., Jain, A. K., Maltoni, D., & Maio, D. (Eds.). (2004). Biometric systems: Technology, design and performance evaluation. New York: Springer.
-
(2004)
Biometric Systems: Technology, Design and Performance Evaluation
-
-
Wayman, J.1
Jain, A.K.2
Maltoni, D.3
Maio, D.4
-
39
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
-
Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., & Memon, N. (2005). Passpoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63 (1-2), 102-127. doi:10.1016/j.ijhcs.2005.04.010 (Pubitemid 40753495)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
40
-
-
0142007144
-
A user friendly remote authentication scheme with smart cards
-
doi:10.1016/S0167-4048 03 00616-3
-
Wu, S.-T., & Chieu, B.-C. (2003). A user friendly remote authentication scheme with smart cards. Computers & Security, 22(6), 547-550. doi:10.1016/S0167-4048 (03) 00616-3
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 547-550
-
-
Wu, S.-T.1
Chieu, B.-C.2
-
41
-
-
34547294916
-
The memorability and security of passwords
-
Cranor, L., & Garfinkel, S. Eds., Sebastopol, CA: O'Reilly & Associates
-
Yan, J., Blackwell, A., Anderson, R., & Grant, A. (2005). The memorability and security of passwords. In Cranor, L., & Garfinkel, S. (Eds.), Security and usability: Designing secure systems that people can use (pp. 121-134). Sebastopol, CA: O'Reilly & Associates.
-
(2005)
Security and Usability: Designing Secure Systems That People Can. use
, pp. 121-134
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
42
-
-
3042852406
-
Keystroke dynamics identity verification: Its problems and practical solutions
-
doi:10.1016/j.cose.2004.02.004
-
Yu, E., & Cho, S. (2004). Keystroke dynamics identity verification: Its problems and practical solutions. Computers & Security, 23(5), 428-440. doi:10.1016/j.cose.2004.02.004
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 428-440
-
-
Yu, E.1
Cho, S.2
-
43
-
-
38349147070
-
Intrusion prevention in information systems: Reactive and proactive responses
-
doi:10.2753/MIS0742-1222240110
-
Yue, W. T., & Cakanyildirim, M. (2007). Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24(1), 329-353. doi:10.2753/MIS0742-1222240110
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 329-353
-
-
Yue, W.T.1
Cakanyildirim, M.2
-
45
-
-
70349356396
-
Identification and authentication: Technology and implementation issues
-
Zviran, M., & Erlich, Z. (2006). Identification and authentication: Technology and implementation issues. Communications of the Association for Information Systems, 17(4), 90-105.
-
(2006)
Communications of the Association for Information Systems
, vol.17
, Issue.4
, pp. 90-105
-
-
Zviran, M.1
Erlich, Z.2
-
46
-
-
0003369812
-
A comparison of password techniques for multilevel authentication mechanisms
-
doi:10.1093/comjnl/36.3.227
-
Zviran, M., & Haga, W. J. (1993). A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal, 36(3), 227-237. doi:10.1093/comjnl/36.3.227
-
(1993)
The Computer Journal
, vol.36
, Issue.3
, pp. 227-237
-
-
Zviran, M.1
Haga, W.J.2
|