메뉴 건너뛰기




Volumn , Issue , 2011, Pages 32-46

Using fingerprint authentication to reduce system security: An empirical study

Author keywords

Risk compensation; Security policy; Two factor authentication; User study

Indexed keywords

BEHAVIORAL RESEARCH; SECURITY SYSTEMS;

EID: 80051962268     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.35     Document Type: Conference Paper
Times cited : (29)

References (34)
  • 1
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • DOI 10.1145/1242572.1242661, 16th International World Wide Web Conference, WWW2007
    • D. Florencio and C. Herley, "A large-scale study of web password habits," in WWW '07: Proceedings of the 16th International Conference on World Wide Web. Banff, Alberta, Canada: ACM, 2007, pp. 657-666. (Pubitemid 47582295)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 657-666
    • Florencio, D.1    Herley, C.2
  • 3
    • 77951550003 scopus 로고    scopus 로고
    • Password authentication from a human factors perspective: Results of a survey among end-users
    • September
    • P. Hoonakker, N. Bornoe, and P. Carayon, "Password authentication from a human factors perspective: Results of a survey among end-users," Human Factors and Ergonomics Society Annual Meeting Proceedings, vol. 53, pp. 459-463(5), September 2009.
    • (2009) Human Factors and Ergonomics Society Annual Meeting Proceedings , vol.53 , Issue.5 , pp. 459-463
    • Hoonakker, P.1    Bornoe, N.2    Carayon, P.3
  • 5
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • DOI 10.1109/MSP.2004.81
    • J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password memorability and security: empirical results," Security & Privacy, IEEE, vol. 2, no. 5, pp. 25-31, 2004. (Pubitemid 40168623)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Alan, B.2    Anderson, R.3    Grant, A.4
  • 7
    • 85084162383 scopus 로고    scopus 로고
    • On user choice in graphical password schemes
    • Berkeley, CA, USA: USENIX Association
    • D. Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in In 13th USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2004, pp. 151-164.
    • (2004) 13th USENIX Security Symposium , pp. 151-164
    • Davis, D.1    Monrose, F.2    Reiter, M.K.3
  • 9
    • 3042857071 scopus 로고    scopus 로고
    • On risk: Perception and direction
    • A. Stewart, "On risk: perception and direction," Computers & Security, vol. 23, no. 5, pp. 362 - 370, 2004.
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 362-370
    • Stewart, A.1
  • 10
    • 0030083092 scopus 로고    scopus 로고
    • Risk homeostasis theory: Problems of the past and promises for the future
    • DOI 10.1016/0925-7535(96)00010-0
    • R. M. Trimpop, "Risk homeostasis theory: roblems of the past and promises for the future," Safety Science, vol. 22, no. 1-3, pp. 119 - 130, 1996. (Pubitemid 26290907)
    • (1996) Safety Science , vol.22 , Issue.1-3 , pp. 119-130
    • Trimpop, R.M.1
  • 15
    • 4544366486 scopus 로고    scopus 로고
    • The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security
    • DOI 10.1111/j.0272-4332.2004.00495.x
    • S. Sagan, "The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security," Risk Analysis, vol. 24, pp. 935-946, 2004. (Pubitemid 39238486)
    • (2004) Risk Analysis , vol.24 , Issue.4 , pp. 935-946
    • Sagan, S.D.1
  • 16
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • DOI 10.1109/JPROC.2003.819611, Electronic Textiles: A Platform for Pervasive Computing
    • L. O'Gorman, "Comparing passwords, tokens, and biometrics for user authentication," Proceedings of the IEEE, vol. 91, no. 12, pp. 2021-2040, Dec. 2003. (Pubitemid 40890781)
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O'Gorman, L.1
  • 17
    • 0242708745 scopus 로고    scopus 로고
    • Pretty good persuasion: A first step towards effective password security in the real world
    • Cloudcroft, New Mexico: ACM
    • D. Weirich and M. A. Sasse, "Pretty good persuasion: a first step towards effective password security in the real world," in Proceedings of the 2001 workshop on New security paradigms, ser. NSPW '01. Cloudcroft, New Mexico: ACM, 2001, pp. 137-143.
    • (2001) Proceedings of the 2001 Workshop on New Security Paradigms, Ser. NSPW '01 , pp. 137-143
    • Weirich, D.1    Sasse, M.A.2
  • 18
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton, "Analysis of end user security behaviors," Computers & Security, vol. 24, no. 2, pp. 124-133, 2005. (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 21
    • 0024058661 scopus 로고
    • An experimental test of risk compensation: Between-subject versus within-subject analyses
    • F. M. Streff and E. Geller, "An experimental test of risk compensation: Between-subject versus within-subject analyses," Accident Analysis & Prevention, vol. 20, no. 4, pp. 277 - 287, 1988.
    • (1988) Accident Analysis & Prevention , vol.20 , Issue.4 , pp. 277-287
    • Streff, F.M.1    Geller, E.2
  • 23
    • 0003087622 scopus 로고
    • Risk reduction or risk compensation? The case of mandatory safety-belt use laws
    • W. N. Evans and J. D. Graham, "Risk reduction or risk compensation? the case of mandatory safety-belt use laws," Journal of Risk and Uncertainty, vol. 4, pp. 61-73, 1991.
    • (1991) Journal of Risk and Uncertainty , vol.4 , pp. 61-73
    • Evans, W.N.1    Graham, J.D.2
  • 24
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • D. Besnard and B. Arief, "Computer security impaired by legitimate users," Computers & Security, vol. 23, no. 3, pp. 253 - 264, 2004.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 25
    • 42149161709 scopus 로고    scopus 로고
    • The psychology of security
    • DOI 10.1145/1330311.1330320
    • R. West, "The psychology of security," Commun. ACM, vol. 51, pp. 34-40, April 2008. (Pubitemid 351530776)
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 34-40
    • West, R.1
  • 26
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
    • E. Albrechtsen, "A qualitative study of users' view on information security," Computers & Security, vol. 26, no. 4, pp. 276 - 289, 2007. (Pubitemid 46873753)
    • (2007) Computers and Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 27
    • 70449688216 scopus 로고    scopus 로고
    • Password cracking using probabilistic context-free grammars
    • IEEE Symposium on May
    • M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek, "Password cracking using probabilistic context-free grammars," Security and Privacy, IEEE Symposium on, vol. 0, pp. 391-405, May 2009.
    • (2009) Security and Privacy , pp. 391-405
    • Weir, M.1    Aggarwal, S.2    De Medeiros, B.3    Glodek, B.4
  • 28
    • 80052011240 scopus 로고    scopus 로고
    • Mar. [Online]
    • (2011, Mar.) Openwall wordlists collection. [Online]. Available: http://www.openwall.com/wordlists/
    • (2011) Openwall Wordlists Collection
  • 32
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • December
    • A. Adams and M. A. Sasse, "Users are not the enemy," Commun. ACM, vol. 42, pp. 40-46, December 1999.
    • (1999) Commun. ACM , vol.42 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 34
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop and D. V. Klein, "Improving system security via proactive password checking," Computers & Security, vol. 14, no. 3, pp. 233-249, 1995.
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.