-
1
-
-
35348884906
-
A large-scale study of web password habits
-
DOI 10.1145/1242572.1242661, 16th International World Wide Web Conference, WWW2007
-
D. Florencio and C. Herley, "A large-scale study of web password habits," in WWW '07: Proceedings of the 16th International Conference on World Wide Web. Banff, Alberta, Canada: ACM, 2007, pp. 657-666. (Pubitemid 47582295)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
2
-
-
85006986397
-
Weak password security: An empirical study
-
J. E. Webber, D. Guster, P. Safonov, and M. B. Schmidt, "Weak password security: An empirical study." Information Security Journal: A Global Perspective, vol. 17, no. 1, pp. 45-54, 2008.
-
(2008)
Information Security Journal: A Global Perspective
, vol.17
, Issue.1
, pp. 45-54
-
-
Webber, J.E.1
Guster, D.2
Safonov, P.3
Schmidt, M.B.4
-
3
-
-
77951550003
-
Password authentication from a human factors perspective: Results of a survey among end-users
-
September
-
P. Hoonakker, N. Bornoe, and P. Carayon, "Password authentication from a human factors perspective: Results of a survey among end-users," Human Factors and Ergonomics Society Annual Meeting Proceedings, vol. 53, pp. 459-463(5), September 2009.
-
(2009)
Human Factors and Ergonomics Society Annual Meeting Proceedings
, vol.53
, Issue.5
, pp. 459-463
-
-
Hoonakker, P.1
Bornoe, N.2
Carayon, P.3
-
4
-
-
77953306210
-
Password strength: An empirical analysis
-
Piscataway, NJ, USA: IEEE Press
-
M. Dell'Amico, P. Michiardi, and Y. Roudier, "Password strength: an empirical analysis," in INFOCOM'10: Proceedings of the 29th Conference on Information Communications. Piscataway, NJ, USA: IEEE Press, 2010, pp. 983-991.
-
(2010)
INFOCOM'10: Proceedings of the 29th Conference on Information Communications
, pp. 983-991
-
-
Dell'Amico, M.1
Michiardi, P.2
Roudier, Y.3
-
5
-
-
12844275960
-
Password memorability and security: Empirical results
-
DOI 10.1109/MSP.2004.81
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password memorability and security: empirical results," Security & Privacy, IEEE, vol. 2, no. 5, pp. 25-31, 2004. (Pubitemid 40168623)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Alan, B.2
Anderson, R.3
Grant, A.4
-
6
-
-
70349973978
-
Persuasion for stronger passwords: Motivation and pilot study
-
A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle, "Persuasion for stronger passwords: Motivation and pilot study," in Persuasive Technology, ser. Lecture Notes in Computer Science, 2008, vol. 5033, pp. 140-150.
-
(2008)
Persuasive Technology, Ser. Lecture Notes in Computer Science
, vol.5033
, pp. 140-150
-
-
Forget, A.1
Chiasson, S.2
Van Oorschot, P.3
Biddle, R.4
-
7
-
-
85084162383
-
On user choice in graphical password schemes
-
Berkeley, CA, USA: USENIX Association
-
D. Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in In 13th USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2004, pp. 151-164.
-
(2004)
13th USENIX Security Symposium
, pp. 151-164
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
8
-
-
0037699592
-
Usability and biometric verification at the ATM interface
-
Ft. Lauderdale, Florida, USA: ACM
-
L. Coventry, A. De Angeli, and G. Johnson, "Usability and biometric verification at the ATM interface," in CHI '03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Ft. Lauderdale, Florida, USA: ACM, 2003, pp. 153-160.
-
(2003)
CHI '03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 153-160
-
-
Coventry, L.1
De Angeli, A.2
Johnson, G.3
-
9
-
-
3042857071
-
On risk: Perception and direction
-
A. Stewart, "On risk: perception and direction," Computers & Security, vol. 23, no. 5, pp. 362 - 370, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 362-370
-
-
Stewart, A.1
-
10
-
-
0030083092
-
Risk homeostasis theory: Problems of the past and promises for the future
-
DOI 10.1016/0925-7535(96)00010-0
-
R. M. Trimpop, "Risk homeostasis theory: roblems of the past and promises for the future," Safety Science, vol. 22, no. 1-3, pp. 119 - 130, 1996. (Pubitemid 26290907)
-
(1996)
Safety Science
, vol.22
, Issue.1-3
, pp. 119-130
-
-
Trimpop, R.M.1
-
11
-
-
0033277446
-
Password security: An empirical study
-
M. Zviran and W. J. Haga, "Password security: an empirical study," J. Manage. Inf. Syst., vol. 15, pp. 161-185, March 1999. (Pubitemid 32716609)
-
(1999)
Journal of Management Information Systems
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.J.2
-
12
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
DOI 10.1016/j.ijhcs.2007.03.007, PII S1071581907000560
-
K.-P. L. Vu, R. W. Proctor, A. Bhargav-Spantzel, B.-L. B. Tai, J. Cook, and E. E. Schultz, "Improving password security and memorability to protect personal and organizational information," International Journal of Human-Computer Studies, vol. 65, no. 8, pp. 744-757, 2007. (Pubitemid 46824074)
-
(2007)
International Journal of Human Computer Studies
, vol.65
, Issue.8
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.4
Cook, J.5
Eugene Schultz, E.6
-
13
-
-
77953963809
-
The true cost of unusable password policies: Password use in the wild
-
Atlanta, Georgia, USA: ACM
-
P. G. Inglesant and M. A. Sasse, "The true cost of unusable password policies: password use in the wild," in Proceedings of the 28th international conference on Human factors in computing systems, ser. CHI '10. Atlanta, Georgia, USA: ACM, 2010, pp. 383-392.
-
(2010)
Proceedings of the 28th International Conference on Human Factors in Computing Systems, Ser. CHI '10
, pp. 383-392
-
-
Inglesant, P.G.1
Sasse, M.A.2
-
14
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
C. Herley, "So long, and no thanks for the externalities: the rational rejection of security advice by users," in Proceedings of the 2009 workshop on New security paradigms workshop, ser. NSPW '09, 2009, pp. 133-144.
-
(2009)
Proceedings of the 2009 Workshop on New Security Paradigms Workshop, Ser. NSPW '09
, pp. 133-144
-
-
Herley, C.1
-
15
-
-
4544366486
-
The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security
-
DOI 10.1111/j.0272-4332.2004.00495.x
-
S. Sagan, "The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security," Risk Analysis, vol. 24, pp. 935-946, 2004. (Pubitemid 39238486)
-
(2004)
Risk Analysis
, vol.24
, Issue.4
, pp. 935-946
-
-
Sagan, S.D.1
-
16
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
DOI 10.1109/JPROC.2003.819611, Electronic Textiles: A Platform for Pervasive Computing
-
L. O'Gorman, "Comparing passwords, tokens, and biometrics for user authentication," Proceedings of the IEEE, vol. 91, no. 12, pp. 2021-2040, Dec. 2003. (Pubitemid 40890781)
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'Gorman, L.1
-
17
-
-
0242708745
-
Pretty good persuasion: A first step towards effective password security in the real world
-
Cloudcroft, New Mexico: ACM
-
D. Weirich and M. A. Sasse, "Pretty good persuasion: a first step towards effective password security in the real world," in Proceedings of the 2001 workshop on New security paradigms, ser. NSPW '01. Cloudcroft, New Mexico: ACM, 2001, pp. 137-143.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms, Ser. NSPW '01
, pp. 137-143
-
-
Weirich, D.1
Sasse, M.A.2
-
18
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton, "Analysis of end user security behaviors," Computers & Security, vol. 24, no. 2, pp. 124-133, 2005. (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
20
-
-
60649116908
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
Pittsburgh, Pennsylvania: ACM
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: effects of tolerance and image choice," in Proceedings of the 2005 symposium on Usable privacy and security, ser. SOUPS '05. Pittsburgh, Pennsylvania: ACM, 2005, pp. 1-12.
-
(2005)
Proceedings of the 2005 Symposium on Usable Privacy and Security, Ser. SOUPS '05
, pp. 1-12
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
21
-
-
0024058661
-
An experimental test of risk compensation: Between-subject versus within-subject analyses
-
F. M. Streff and E. Geller, "An experimental test of risk compensation: Between-subject versus within-subject analyses," Accident Analysis & Prevention, vol. 20, no. 4, pp. 277 - 287, 1988.
-
(1988)
Accident Analysis & Prevention
, vol.20
, Issue.4
, pp. 277-287
-
-
Streff, F.M.1
Geller, E.2
-
22
-
-
0032595989
-
Risk compensation - The case of road lighting
-
T. Assum, T. Bjrnskau, S. Fosser, and F. Sagberg, "Risk compensation - the case of road lighting," Accident Analysis & Prevention, vol. 31, no. 5, pp. 545 - 553, 1999.
-
(1999)
Accident Analysis & Prevention
, vol.31
, Issue.5
, pp. 545-553
-
-
Assum, T.1
Bjrnskau, T.2
Fosser, S.3
Sagberg, F.4
-
23
-
-
0003087622
-
Risk reduction or risk compensation? The case of mandatory safety-belt use laws
-
W. N. Evans and J. D. Graham, "Risk reduction or risk compensation? the case of mandatory safety-belt use laws," Journal of Risk and Uncertainty, vol. 4, pp. 61-73, 1991.
-
(1991)
Journal of Risk and Uncertainty
, vol.4
, pp. 61-73
-
-
Evans, W.N.1
Graham, J.D.2
-
24
-
-
2342598277
-
Computer security impaired by legitimate users
-
D. Besnard and B. Arief, "Computer security impaired by legitimate users," Computers & Security, vol. 23, no. 3, pp. 253 - 264, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
25
-
-
42149161709
-
The psychology of security
-
DOI 10.1145/1330311.1330320
-
R. West, "The psychology of security," Commun. ACM, vol. 51, pp. 34-40, April 2008. (Pubitemid 351530776)
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
-
26
-
-
34249871944
-
A qualitative study of users' view on information security
-
DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
-
E. Albrechtsen, "A qualitative study of users' view on information security," Computers & Security, vol. 26, no. 4, pp. 276 - 289, 2007. (Pubitemid 46873753)
-
(2007)
Computers and Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
27
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
IEEE Symposium on May
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek, "Password cracking using probabilistic context-free grammars," Security and Privacy, IEEE Symposium on, vol. 0, pp. 391-405, May 2009.
-
(2009)
Security and Privacy
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
28
-
-
80052011240
-
-
Mar. [Online]
-
(2011, Mar.) Openwall wordlists collection. [Online]. Available: http://www.openwall.com/wordlists/
-
(2011)
Openwall Wordlists Collection
-
-
-
30
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
Chicago, Illinois, USA: ACM
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern, "Testing metrics for password creation policies by attacking large sets of revealed passwords," in Proceedings of the 17th ACM conference on Computer and communications security, ser. CCS '10. Chicago, Illinois, USA: ACM, 2010, pp. 162-175.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, Ser. CCS '10
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
31
-
-
85044211678
-
Do strong web passwords accomplish anything?
-
Berkeley, CA, USA: USENIX Association
-
D. Florêncio, C. Herley, and B. Coskun, "Do strong web passwords accomplish anything?" in Proceedings of the 2nd USENIX workshop on Hot topics in security. Berkeley, CA, USA: USENIX Association, 2007, pp. 10:1-10:6.
-
(2007)
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security
, pp. 101-106
-
-
Florêncio, D.1
Herley, C.2
Coskun, B.3
-
32
-
-
0043232732
-
Users are not the enemy
-
December
-
A. Adams and M. A. Sasse, "Users are not the enemy," Commun. ACM, vol. 42, pp. 40-46, December 1999.
-
(1999)
Commun. ACM
, vol.42
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
33
-
-
84950656359
-
Variations of box plots
-
R. McGill, J. W. Tukey, and W. A. Larsen, "Variations of Box Plots," The American Statistician, vol. 32, no. 1, pp. 12-16, 1978.
-
(1978)
The American Statistician
, vol.32
, Issue.1
, pp. 12-16
-
-
McGill, R.1
Tukey, J.W.2
Larsen, W.A.3
-
34
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop and D. V. Klein, "Improving system security via proactive password checking," Computers & Security, vol. 14, no. 3, pp. 233-249, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
|