메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2595-2604

Of passwords and people: Measuring the effect of password-composition policies

Author keywords

Passwords; Policy; Security; Usability

Indexed keywords

AUTHENTICATION; NETWORK SECURITY;

EID: 79958161706     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1978942.1979321     Document Type: Conference Paper
Times cited : (299)

References (23)
  • 1
    • 0242444871 scopus 로고    scopus 로고
    • Making passwords secure and usable
    • A. Adams, M. A. Sasse, and P. Lunt. Making passwords secure and usable. In HCI 97, 1997.
    • (1997) HCI 97
    • Adams, A.1    Sasse, M.A.2    Lunt, P.3
  • 2
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 3
    • 79958097346 scopus 로고    scopus 로고
    • The password thicket: Technical and market failures in human authentication on the web
    • June
    • J. Bonneau and S. Preibusch. The password thicket: technical and market failures in human authentication on the web. In Proc. (online) of WEIS'10, June 2010.
    • (2010) Proc. (online) of WEIS'10
    • Bonneau, J.1    Preibusch, S.2
  • 5
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • D. Florêncio and C. Herley. A large-scale study of web password habits. In Proc. WWW'07, 2007.
    • (2007) Proc. WWW'07
    • Florêncio, D.1    Herley, C.2
  • 7
    • 77953963809 scopus 로고    scopus 로고
    • The true cost of unusable password policies: Password use in the wild
    • P. Inglesant and M. A. Sasse. The true cost of unusable password policies: password use in the wild. In Proc. ACM CHI'10, pages 383-392, 2010.
    • (2010) Proc. ACM CHI'10 , pp. 383-392
    • Inglesant, P.1    Sasse, M.A.2
  • 9
  • 11
    • 0041877169 scopus 로고    scopus 로고
    • Estimation of entropy and mutual information
    • DOI 10.1162/089976603321780272
    • L. Paninski. Estimation of entropy and mutual information. Neural Comp., 15(6):1191-1253, 2003. (Pubitemid 37049793)
    • (2003) Neural Computation , vol.15 , Issue.6 , pp. 1191-1253
    • Paninski, L.1
  • 12
    • 0036559882 scopus 로고    scopus 로고
    • Improving computer security for authentication of users: Influence of proactive password restrictions
    • Instruments, & Computers
    • R. W. Proctor, M.-C. Lien, K.-P. L. Vu, E. E. Schultz, and G. Salvendy. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Res. Methods, Instruments, & Computers, 34(2):163-169, 2002.
    • (2002) Behavior Res. Methods , vol.34 , Issue.2 , pp. 163-169
    • Proctor, R.W.1    Lien, M.-C.2    Vu, K.-P.L.3    Schultz, E.E.4    Salvendy, G.5
  • 13
    • 85071080463 scopus 로고    scopus 로고
    • Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
    • S. Schechter, C. Herley, and M. Mitzenmacher. Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks. In Proc. HotSec'10, 2010.
    • (2010) Proc. HotSec'10
    • Schechter, S.1    Herley, C.2    Mitzenmacher, M.3
  • 15
    • 84944486544 scopus 로고
    • Prediction and entropy of printed english
    • C. E. Shannon. Prediction and entropy of printed english. Bell Systems Tech. J., 30:50-64, 1951.
    • (1951) Bell Systems Tech. J. , vol.30 , pp. 50-64
    • Shannon, C.E.1
  • 16
    • 68449088124 scopus 로고    scopus 로고
    • A comprehensive simulation tool for the analysis of password policies
    • R. Shay and E. Bertino. A comprehensive simulation tool for the analysis of password policies. Int. J. Info. Sec., 8(4):275-289, 2009.
    • (2009) Int. J. Info. Sec. , vol.8 , Issue.4 , pp. 275-289
    • Shay, R.1    Bertino, E.2
  • 18
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton. Analysis of end user security behaviors. Comp. & Security, 24(2):124 - 133, 2005. (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 19
    • 79958107372 scopus 로고    scopus 로고
    • January retrieved September 2010
    • A. Vance. If your password is 123456, just make it hackme. New York Times, http://www.nytimes.com/2010/01/21/technology/21password.html, January 2010, retrieved September 2010.
    • (2010) If Your Password Is 123456, Just Make It Hackme
    • Vance, A.1
  • 22
    • 78650011800 scopus 로고    scopus 로고
    • The security of modern password expiration: An algorithmic framework and empirical analysis
    • Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proc. ACM CCS'10, 2010.
    • (2010) Proc. ACM CCS'10
    • Zhang, Y.1    Monrose, F.2    Reiter, M.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.