메뉴 건너뛰기




Volumn 23, Issue 3, 2011, Pages 256-267

Using and managing multiple passwords: A week to a view

Author keywords

Password management; Security; User authentication

Indexed keywords

BEHAVIORAL RESEARCH;

EID: 79957818269     PISSN: 09535438     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.intcom.2011.03.007     Document Type: Article
Times cited : (83)

References (36)
  • 5
    • 84855202936 scopus 로고    scopus 로고
    • BBC News BBC News, UK Edition
    • BBC News, 2004. Passwords Revealed by Sweet Deal. BBC News, UK Edition. < http://news.bbc.co.uk/1/hi/technology/3639679.stm >.
    • (2004) Passwords Revealed by Sweet Deal
  • 7
    • 79957866436 scopus 로고    scopus 로고
    • The password thicket: Technical and Markey failures in human authentication on the web
    • Bonneau, Preibusch Boston, MA, USA.
    • Bonneau, Preibusch, 2010. The password thicket: Technical and Markey failures in human authentication on the web. In: Proceedings of WEIS 2010, Boston, MA, USA.
    • (2010) Proceedings of WEIS 2010
  • 11
    • 84861301300 scopus 로고    scopus 로고
    • When participants do the capturing: The role of media in diary studies
    • CHI 2005: Technology, Safety, Community: Conference Proceedings - Conference on Human Factors in Computing Systems
    • Carter, S.; Mankoff, J.; 2005. When participants do the capturing: The role of media in diary studies. In: Proceedings of the 2005 ACM Conference on Human Factors in Computing Systems, pp. 899-908. (Pubitemid 41809125)
    • (2005) Conference on Human Factors in Computing Systems - Proceedings , pp. 899-908
    • Carter, S.1    Mankoff, J.2
  • 12
    • 38349146712 scopus 로고    scopus 로고
    • Privacy policy enforcement in enterprises with identity management solutions
    • M. Casassa Mont, and R. Thyne Privacy policy enforcement in enterprises with identity management solutions Journal of Computer Security 16 2 2008 133 163
    • (2008) Journal of Computer Security , vol.16 , Issue.2 , pp. 133-163
    • Casassa Mont, M.1    Thyne, R.2
  • 16
    • 34250729756 scopus 로고    scopus 로고
    • Password management strategies for online accounts
    • DOI 10.1145/1143120.1143127, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
    • Gaw, S.; Felten, E.W.; 2006. Password management strategies for online accounts. In: Proc Soups 2006, pp 44-55. (Pubitemid 46966968)
    • (2006) ACM International Conference Proceeding Series , vol.149 , pp. 44-55
    • Gaw, S.1    Felten, E.W.2
  • 18
    • 4243065486 scopus 로고    scopus 로고
    • Security: An uneasy alliance
    • H. Harreld Security: an uneasy alliance Infoworld 23 13 2001 42 44
    • (2001) Infoworld , vol.23 , Issue.13 , pp. 42-44
    • Harreld, H.1
  • 19
    • 1642498867 scopus 로고
    • How to prevent the use of weak passwords
    • J.H. Highland How to prevent the use of weak passwords EDPACS 18 9 1991 7 12
    • (1991) EDPACS , vol.18 , Issue.9 , pp. 7-12
    • Highland, J.H.1
  • 20
    • 34547249147 scopus 로고    scopus 로고
    • Using diaries in group based information behavior research- A methodological study
    • DOI 10.1145/1164820.1164851, ACM International Conference Proceeding Series - Proceedings of the 1st International Conference on Information Interaction in Context
    • Hyldegard, J.; 2006. Using diaries in group-based information behaviour research: a methodological study. In: Proceedings of the Information Interaction in Context, pp. 153-161. (Pubitemid 47142390)
    • (2006) ACM International Conference Proceeding Series , vol.176 , pp. 153-161
    • Hyldegard, J.1
  • 23
    • 33751168960 scopus 로고    scopus 로고
    • The usability of passphrases for authentication: An empirical field study
    • DOI 10.1016/j.ijhcs.2006.08.005, PII S1071581906001236
    • M. Keith, B. Shao, and P.J. Steinbart The usability of passphrases for authentication: an empirical field study International Journal of Human-Computer Studies 65 1 2007 17 28 (Pubitemid 44780141)
    • (2007) International Journal of Human Computer Studies , vol.65 , Issue.1 , pp. 17-28
    • Keith, M.1    Shao, B.2    Steinbart, P.J.3
  • 25
    • 0018543411 scopus 로고    scopus 로고
    • Password security: A case history
    • R. Morris, and K. Thompson Password security: a case history Communications of the ACM 22 11 1997 594 597
    • (1997) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 32
    • 77549083913 scopus 로고    scopus 로고
    • Usable security: User preferences for authentification methods in e-banking and the effects of experience
    • C.S. Weir, G. Douglas, T. Richardson, and M. Jack Usable security: user preferences for authentification methods in e-banking and the effects of experience Interacting with Computers 22 2010 153 164
    • (2010) Interacting with Computers , vol.22 , pp. 153-164
    • Weir, C.S.1    Douglas, G.2    Richardson, T.3    Jack, M.4
  • 33
    • 19944381937 scopus 로고    scopus 로고
    • PassPoints: Design and longitudinal evaluation of a graphical password system
    • DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
    • S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, and N. Memon PassPoints: design and longitudinal evaluation of a graphical password system International Journal of Human-Computer Studies, Special Issue on HCI Research on Privacy and Security 63 2005 102 127 (Pubitemid 40753495)
    • (2005) International Journal of Human Computer Studies , vol.63 , Issue.1-2 , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.-C.3    Brodskiy, A.4    Memon, N.5
  • 34
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • DOI 10.1109/MSP.2004.81
    • J. Yan, A. Blackwell, R. Anderson, and A. Grant Password memorability and security: empirical results Security & Privacy Magazine IEEE 2 5 2004 25 31 (Pubitemid 40168623)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Alan, B.2    Anderson, R.3    Grant, A.4
  • 35
    • 0025545602 scopus 로고
    • Cognitive passwords: The key for easy access control
    • M. Zviran, and W.J. Haga Cognitive passwords: the key for easy access control Computer and Security 9 8 1990 723 736
    • (1990) Computer and Security , vol.9 , Issue.8 , pp. 723-736
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.