-
5
-
-
84855202936
-
-
BBC News BBC News, UK Edition
-
BBC News, 2004. Passwords Revealed by Sweet Deal. BBC News, UK Edition. < http://news.bbc.co.uk/1/hi/technology/3639679.stm >.
-
(2004)
Passwords Revealed by Sweet Deal
-
-
-
7
-
-
79957866436
-
The password thicket: Technical and Markey failures in human authentication on the web
-
Bonneau, Preibusch Boston, MA, USA.
-
Bonneau, Preibusch, 2010. The password thicket: Technical and Markey failures in human authentication on the web. In: Proceedings of WEIS 2010, Boston, MA, USA.
-
(2010)
Proceedings of WEIS 2010
-
-
-
9
-
-
7744227917
-
Generating and remembering passwords
-
DOI 10.1002/acp.1014
-
A.S. Brown, E. Bracken, S. Zoccoli, and K. Douglas Generating and remembering passwords Applied Cognitive Psychology 18 6 2004 641 651 (Pubitemid 39462044)
-
(2004)
Applied Cognitive Psychology
, vol.18
, Issue.6
, pp. 641-651
-
-
Brown, A.S.1
Bracken, E.2
Zoccoli, S.3
Douglas, K.4
-
11
-
-
84861301300
-
When participants do the capturing: The role of media in diary studies
-
CHI 2005: Technology, Safety, Community: Conference Proceedings - Conference on Human Factors in Computing Systems
-
Carter, S.; Mankoff, J.; 2005. When participants do the capturing: The role of media in diary studies. In: Proceedings of the 2005 ACM Conference on Human Factors in Computing Systems, pp. 899-908. (Pubitemid 41809125)
-
(2005)
Conference on Human Factors in Computing Systems - Proceedings
, pp. 899-908
-
-
Carter, S.1
Mankoff, J.2
-
12
-
-
38349146712
-
Privacy policy enforcement in enterprises with identity management solutions
-
M. Casassa Mont, and R. Thyne Privacy policy enforcement in enterprises with identity management solutions Journal of Computer Security 16 2 2008 133 163
-
(2008)
Journal of Computer Security
, vol.16
, Issue.2
, pp. 133-163
-
-
Casassa Mont, M.1
Thyne, R.2
-
13
-
-
4544263671
-
A diary study of task switching and interruptions
-
Vienna, April 2004
-
Czerwinski, M.; Horvitz, E.; Wilhite, S.; 2004. A diary study of task switching and interruptions. In: Proceedings of CHI 2004, Human Factors in Computing Systems. Vienna, April 2004.
-
(2004)
Proceedings of CHI 2004, Human Factors in Computing Systems
-
-
Czerwinski, M.1
Horvitz, E.2
Wilhite, S.3
-
16
-
-
34250729756
-
Password management strategies for online accounts
-
DOI 10.1145/1143120.1143127, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
-
Gaw, S.; Felten, E.W.; 2006. Password management strategies for online accounts. In: Proc Soups 2006, pp 44-55. (Pubitemid 46966968)
-
(2006)
ACM International Conference Proceeding Series
, vol.149
, pp. 44-55
-
-
Gaw, S.1
Felten, E.W.2
-
18
-
-
4243065486
-
Security: An uneasy alliance
-
H. Harreld Security: an uneasy alliance Infoworld 23 13 2001 42 44
-
(2001)
Infoworld
, vol.23
, Issue.13
, pp. 42-44
-
-
Harreld, H.1
-
19
-
-
1642498867
-
How to prevent the use of weak passwords
-
J.H. Highland How to prevent the use of weak passwords EDPACS 18 9 1991 7 12
-
(1991)
EDPACS
, vol.18
, Issue.9
, pp. 7-12
-
-
Highland, J.H.1
-
20
-
-
34547249147
-
Using diaries in group based information behavior research- A methodological study
-
DOI 10.1145/1164820.1164851, ACM International Conference Proceeding Series - Proceedings of the 1st International Conference on Information Interaction in Context
-
Hyldegard, J.; 2006. Using diaries in group-based information behaviour research: a methodological study. In: Proceedings of the Information Interaction in Context, pp. 153-161. (Pubitemid 47142390)
-
(2006)
ACM International Conference Proceeding Series
, vol.176
, pp. 153-161
-
-
Hyldegard, J.1
-
23
-
-
33751168960
-
The usability of passphrases for authentication: An empirical field study
-
DOI 10.1016/j.ijhcs.2006.08.005, PII S1071581906001236
-
M. Keith, B. Shao, and P.J. Steinbart The usability of passphrases for authentication: an empirical field study International Journal of Human-Computer Studies 65 1 2007 17 28 (Pubitemid 44780141)
-
(2007)
International Journal of Human Computer Studies
, vol.65
, Issue.1
, pp. 17-28
-
-
Keith, M.1
Shao, B.2
Steinbart, P.J.3
-
30
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
July 14-16 Redmond, WA, USA.
-
Shay, R.; Komanduri, S.; Kelley, P.G.; Bauer, L.; Leon, P.G.; Christin, N.; Mazurek, M.L.; Cranor, L.F.; 2010. Encountering stronger password requirements: User attitudes and behaviors. In: Symposium on Usable Privacy and Security (SOUPS), July 14-16 Redmond, WA, USA.
-
(2010)
Symposium on Usable Privacy and Security (SOUPS)
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
Bauer, L.4
Leon, P.G.5
Christin, N.6
Mazurek, M.L.7
Cranor, L.F.8
-
32
-
-
77549083913
-
Usable security: User preferences for authentification methods in e-banking and the effects of experience
-
C.S. Weir, G. Douglas, T. Richardson, and M. Jack Usable security: user preferences for authentification methods in e-banking and the effects of experience Interacting with Computers 22 2010 153 164
-
(2010)
Interacting with Computers
, vol.22
, pp. 153-164
-
-
Weir, C.S.1
Douglas, G.2
Richardson, T.3
Jack, M.4
-
33
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, and N. Memon PassPoints: design and longitudinal evaluation of a graphical password system International Journal of Human-Computer Studies, Special Issue on HCI Research on Privacy and Security 63 2005 102 127 (Pubitemid 40753495)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
34
-
-
12844275960
-
Password memorability and security: Empirical results
-
DOI 10.1109/MSP.2004.81
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant Password memorability and security: empirical results Security & Privacy Magazine IEEE 2 5 2004 25 31 (Pubitemid 40168623)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Alan, B.2
Anderson, R.3
Grant, A.4
-
35
-
-
0025545602
-
Cognitive passwords: The key for easy access control
-
M. Zviran, and W.J. Haga Cognitive passwords: the key for easy access control Computer and Security 9 8 1990 723 736
-
(1990)
Computer and Security
, vol.9
, Issue.8
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
|