-
2
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
3
-
-
79958097346
-
The password thicket: Technical and market failures in human authentication on the web
-
June
-
J. Bonneau and S. Preibusch. The password thicket: technical and market failures in human authentication on the web. In Proc. (online) of WEIS'10, June 2010.
-
(2010)
Proc. (online) of WEIS'10
-
-
Bonneau, J.1
Preibusch, S.2
-
5
-
-
35348884906
-
A large-scale study of web password habits
-
D. Florêncio and C. Herley. A large-scale study of web password habits. In Proc. WWW'07, 2007.
-
(2007)
Proc. WWW'07
-
-
Florêncio, D.1
Herley, C.2
-
7
-
-
77953963809
-
The true cost of unusable password policies: Password use in the wild
-
P. Inglesant and M. A. Sasse. The true cost of unusable password policies: password use in the wild. In Proc. ACM CHI'10, pages 383-392, 2010.
-
(2010)
Proc. ACM CHI'10
, pp. 383-392
-
-
Inglesant, P.1
Sasse, M.A.2
-
8
-
-
4243096135
-
-
C. ACM
-
B. Ives, K. R. Walsh, and H. Schneider. The domino effect of password reuse. C. ACM, 47(4):75-78, 2004.
-
(2004)
The Domino Effect of Password Reuse
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
9
-
-
84889531501
-
Guessing and entropy
-
page 204
-
J. L. Massey. Guessing and entropy. In Proc. IEEE ISIT'94, page 204, 1994.
-
(1994)
Proc. IEEE ISIT'94
-
-
Massey, J.L.1
-
11
-
-
0041877169
-
Estimation of entropy and mutual information
-
DOI 10.1162/089976603321780272
-
L. Paninski. Estimation of entropy and mutual information. Neural Comp., 15(6):1191-1253, 2003. (Pubitemid 37049793)
-
(2003)
Neural Computation
, vol.15
, Issue.6
, pp. 1191-1253
-
-
Paninski, L.1
-
12
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
Instruments, & Computers
-
R. W. Proctor, M.-C. Lien, K.-P. L. Vu, E. E. Schultz, and G. Salvendy. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Res. Methods, Instruments, & Computers, 34(2):163-169, 2002.
-
(2002)
Behavior Res. Methods
, vol.34
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.-C.2
Vu, K.-P.L.3
Schultz, E.E.4
Salvendy, G.5
-
13
-
-
85071080463
-
Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
-
S. Schechter, C. Herley, and M. Mitzenmacher. Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks. In Proc. HotSec'10, 2010.
-
(2010)
Proc. HotSec'10
-
-
Schechter, S.1
Herley, C.2
Mitzenmacher, M.3
-
15
-
-
84944486544
-
Prediction and entropy of printed english
-
C. E. Shannon. Prediction and entropy of printed english. Bell Systems Tech. J., 30:50-64, 1951.
-
(1951)
Bell Systems Tech. J.
, vol.30
, pp. 50-64
-
-
Shannon, C.E.1
-
16
-
-
68449088124
-
A comprehensive simulation tool for the analysis of password policies
-
R. Shay and E. Bertino. A comprehensive simulation tool for the analysis of password policies. Int. J. Info. Sec., 8(4):275-289, 2009.
-
(2009)
Int. J. Info. Sec.
, vol.8
, Issue.4
, pp. 275-289
-
-
Shay, R.1
Bertino, E.2
-
17
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
R. Shay, S. Komanduri, P. Kelley, P. Leon, M. Mazurek, L. Bauer, N. Christin, and L. Cranor. Encountering stronger password requirements: user attitudes and behaviors. In Proc. SOUPS'10, 2010.
-
(2010)
Proc. SOUPS'10
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.3
Leon, P.4
Mazurek, M.5
Bauer, L.6
Christin, N.7
Cranor, L.8
-
18
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton. Analysis of end user security behaviors. Comp. & Security, 24(2):124 - 133, 2005. (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
19
-
-
79958107372
-
-
January retrieved September 2010
-
A. Vance. If your password is 123456, just make it hackme. New York Times, http://www.nytimes.com/2010/01/21/technology/21password.html, January 2010, retrieved September 2010.
-
(2010)
If Your Password Is 123456, Just Make It Hackme
-
-
Vance, A.1
-
20
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
DOI 10.1016/j.ijhcs.2007.03.007, PII S1071581907000560
-
K.-P. L. Vu, R. W. Proctor, A. Bhargav-Spantzel, B.-L. B. Tai, and J. Cook. Improving password security and memorability to protect personal and organizational information. Int. J. of Human-Comp. Studies, 65(8):744-757, 2007. (Pubitemid 46824074)
-
(2007)
International Journal of Human Computer Studies
, vol.65
, Issue.8
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.4
Cook, J.5
Eugene Schultz, E.6
-
21
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
New York, NY, USA ACM
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 162-175, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
22
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proc. ACM CCS'10, 2010.
-
(2010)
Proc. ACM CCS'10
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
|