메뉴 건너뛰기




Volumn , Issue , 2011, Pages 25-36

A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation

Author keywords

evaluation; passwords; science; usable security

Indexed keywords

ACADEMIC RESEARCH; CONCRETE TARGETS; EVALUATION; GRAPHICAL PASSWORD; INTERNET ACCESS; KNOWLEDGE-BASED AUTHENTICATION; MULTI-WORD; PASSWORDS; REMOTE ACCESS; RESEARCH CHALLENGES; SCIENCE; SCIENTIFIC KNOWLEDGE; SECURITY MECHANISM; SECURITY RESEARCH; TEXT INPUT; TOUCH SCREEN; USABILITY AND SECURITY; USABLE SECURITY; VIRTUAL KEYBOARDS;

EID: 84855656434     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2073276.2073280     Document Type: Conference Paper
Times cited : (12)

References (47)
  • 1
    • 84865001966 scopus 로고    scopus 로고
    • Why I hate Mechanical Turk research (and workshops)
    • E. Adar. Why I hate Mechanical Turk research (and workshops). CHI 2011.
    • (2011) CHI
    • Adar, E.1
  • 2
    • 84871236752 scopus 로고    scopus 로고
    • Spelling-error tolerant, order-independent pass-phrases via the Damerau-Levenshtein string-edit distance metric
    • (ACSW'07), Australian Computer Society
    • G.V. Bard. Spelling-error tolerant, order-independent pass-phrases via the Damerau-Levenshtein string-edit distance metric. Proc. of 5th Australasian Symposium on ACSW Frontiers - volume 68 (ACSW'07), pp.117-124. Australian Computer Society, 2007.
    • (2007) Proc. of 5th Australasian Symposium on ACSW Frontiers , vol.68 , pp. 117-124
    • Bard, G.V.1
  • 3
    • 0021470294 scopus 로고
    • User-friendly password methods for computer-mediated information systems
    • B.F. Barton, M.S. Barton. User-friendly password methods for computer-mediated information systems. Computers & Security v.3(1984):186-195.
    • (1984) Computers & Security , vol.3 , pp. 186-195
    • Barton, B.F.1    Barton, M.S.2
  • 5
    • 84866496149 scopus 로고    scopus 로고
    • Graphical Passwords: Learning from the First Twelve Years
    • to appear
    • R. Biddle, S. Chiasson, P.C. van Oorschot. Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys 44(4), 2012 (to appear).
    • (2012) ACM Computing Surveys , vol.44 , Issue.4
    • Biddle, R.1    Chiasson, S.2    Van Oorschot, P.C.3
  • 7
    • 85095974472 scopus 로고    scopus 로고
    • Evaluating the usability and security of a graphical one-time PIN system
    • S. Brostoff, P. Inglesant, and M. A. Sasse. Evaluating the usability and security of a graphical one-time PIN system. BCS-HCI 2010.
    • (2010) BCS-HCI
    • Brostoff, S.1    Inglesant, P.2    Sasse, M.A.3
  • 9
    • 84855641679 scopus 로고    scopus 로고
    • Rethinking passwords. Invited talk, USENIX LISA 2010 (slides available online)
    • See also summary by Rik Farrow, ; April
    • B. Cheswick. Rethinking passwords. Invited talk, USENIX LISA 2010 (slides available online). See also summary by Rik Farrow, ;login: (USENIX Magazine) 36(2):68-69, April 2011.
    • (2011) Login: (USENIX Magazine) , vol.36 , Issue.2 , pp. 68-69
    • Cheswick, B.1
  • 10
    • 84900557334 scopus 로고    scopus 로고
    • Influencing Users Towards Better Passwords: Persuasive Cued Click-Points
    • S. Chiasson, A. Forget, R. Biddle, P.C. van Oorschot. Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. BCS-HCI 2008.
    • (2008) BCS-HCI
    • Chiasson, S.1    Forget, A.2    Biddle, R.3    Van Oorschot, P.C.4
  • 13
    • 70349562717 scopus 로고    scopus 로고
    • Exploring the Use of Discrete Gestures for Authentication
    • INTERACT 2009, Part II, Springer
    • M.K. Chong, G. Marsden. Exploring the Use of Discrete Gestures for Authentication. INTERACT 2009, Part II, Springer LNCS 5727, pp.205-213, 2009.
    • (2009) LNCS , vol.5727 , pp. 205-213
    • Chong, M.K.1    Marsden, G.2
  • 14
    • 81055156896 scopus 로고    scopus 로고
    • A Closer Look at Recognition-Based Graphical Passwords on Mobile Devices
    • P. Dunphy, A.P. Heiner, N. Asokan. A Closer Look at Recognition-Based Graphical Passwords on Mobile Devices. SOUPS 2010.
    • (2010) SOUPS
    • Dunphy, P.1    Heiner, A.P.2    Asokan, N.3
  • 20
    • 50249129707 scopus 로고    scopus 로고
    • Towards identifying usability and security features of graphical password in knowledge based authentication technique
    • IEEE
    • M.D. Hafiz, A.H. Abdullah, N. Ithnin, and H.K. Mammi. Towards identifying usability and security features of graphical password in knowledge based authentication technique. 2nd Asia Int'l Conf. Modelling & Simulation (2008), 396-403, IEEE.
    • (2008) 2nd Asia Int'l Conf. Modelling & Simulation , pp. 396-403
    • Hafiz, M.D.1    Abdullah, A.H.2    Ithnin, N.3    Mammi, H.K.4
  • 23
    • 84855687317 scopus 로고    scopus 로고
    • personal communication, May
    • M. Jakobsson, personal communication, May 2011.
    • (2011)
    • Jakobsson, M.1
  • 24
    • 0024771499 scopus 로고
    • A survey of password mechanisms: Weaknesses and potential improvements (Part 1)
    • D.L. Jobusch, A.E. Oldehoeft. A survey of password mechanisms: weaknesses and potential improvements (Part 1). Computers & Security v.8(1989):587-604.
    • (1989) Computers & Security , vol.8 , pp. 587-604
    • Jobusch, D.L.1    Oldehoeft, A.E.2
  • 25
    • 0024777503 scopus 로고
    • A survey of password mechanisms: Weaknesses and potential improvements (Part 2)
    • D.L. Jobusch, A.E. Oldehoeft. A survey of password mechanisms: weaknesses and potential improvements (Part 2). Computers & Security v.8(1989):675-689.
    • (1989) Computers & Security , vol.8 , pp. 675-689
    • Jobusch, D.L.1    Oldehoeft, A.E.2
  • 26
    • 35248895598 scopus 로고    scopus 로고
    • Human selection of mnemonic phrase-based passwords
    • C. Kuo, S. Romanosky, L.F. Cranor. Human selection of mnemonic phrase-based passwords. SOUPS 2006.
    • (2006) SOUPS
    • Kuo, C.1    Romanosky, S.2    Cranor, L.F.3
  • 27
    • 78751536330 scopus 로고    scopus 로고
    • Barriers to Science in Security
    • invited essay
    • T. Longstaff, D. Balenson, Mark Matties. Barriers to Science in Security. ACSAC 2010 (invited essay).
    • (2010) ACSAC
    • Longstaff, T.1    Balenson, D.2    Matties, M.3
  • 28
    • 85011627924 scopus 로고    scopus 로고
    • Why is there no science in cyber science?
    • panel report
    • R. Maxion, T. Longstaff, J. McHugh. Why is there no science in cyber science? NSPW 2010 (panel report).
    • (2010) NSPW
    • Maxion, R.1    Longstaff, T.2    McHugh, J.3
  • 29
    • 33750300671 scopus 로고    scopus 로고
    • Improving Usability Through Password-Corrective Hashing
    • SPIRE 2006: String Processing and Info. Retrieval, 13th International Conference. Springer
    • A. Mehler, S. Skiena. Improving Usability Through Password-Corrective Hashing. SPIRE 2006: String Processing and Info. Retrieval, 13th International Conference. LNCS 4209, pp.193-204, Springer, 2006.
    • (2006) LNCS , vol.4209 , pp. 193-204
    • Mehler, A.1    Skiena, S.2
  • 34
    • 84855687318 scopus 로고    scopus 로고
    • A Gesture-based Authentication Scheme for Untrusted Public Terminals
    • S.N. Patel, J.S. Pierce, F.D. Abowd. A Gesture-based Authentication Scheme for Untrusted Public Terminals. ACM UIST'04.
    • ACM UIST'04
    • Patel, S.N.1    Pierce, J.S.2    Abowd, F.D.3
  • 35
    • 6144253216 scopus 로고
    • Strong Inference
    • Oct.16
    • J.R. Platt. Strong Inference. Science 136(3642): 347-353 (Oct.16, 1964).
    • (1964) Science , vol.136 , Issue.3642 , pp. 347-353
    • Platt, J.R.1
  • 36
    • 0019895650 scopus 로고
    • A password extension for improved human factors
    • S.N. Porter. A password extension for improved human factors. Computers & Security v.1(1982):54-56.
    • (1982) Computers & Security , vol.1 , pp. 54-56
    • Porter, S.N.1
  • 38
    • 4544282487 scopus 로고    scopus 로고
    • Information security: The state of science, pseudoscience, and flying pigs
    • invited essay
    • R. Schell. Information security: the state of science, pseudoscience, and flying pigs. ACSAC 2001 (invited essay).
    • (2001) ACSAC
    • Schell, R.1
  • 40
    • 0028406329 scopus 로고
    • Pass-sentence-a new-approach to computer code
    • Y. Spector, J. Ginzberg. Pass-sentence-a new-approach to computer code. Computers & Security v.13(1994):145-160.
    • (1994) Computers & Security , vol.13 , pp. 145-160
    • Spector, Y.1    Ginzberg, J.2
  • 42
    • 78650022232 scopus 로고    scopus 로고
    • Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords
    • M. Weir, S. Aggarwal, M. Collins, H. Stern. Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords. ACM CCS 2010.
    • (2010) ACM CCS
    • Weir, M.1    Aggarwal, S.2    Collins, M.3    Stern, H.4
  • 45
    • 78650011800 scopus 로고    scopus 로고
    • The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis
    • Y. Zhang, F. Monrose, M.K. Reiter. The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis. ACM CCS 2010.
    • (2010) ACM CCS
    • Zhang, Y.1    Monrose, F.2    Reiter, M.K.3
  • 47
    • 0003369812 scopus 로고    scopus 로고
    • A comparison of password techniques for multilevel authentication mechanisms
    • Updates report NPS-54-90-014 (June 1990), Naval Postgraduate School, Monterey, California. (Note: the term multilevel here relates not to MLS operating systems, but to primary vs. secondary passwords.)
    • M. Zviran, W.J. Haga. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal 36(3):227-237. Updates report NPS-54-90-014 (June 1990), Naval Postgraduate School, Monterey, California. (Note: the term multilevel here relates not to MLS operating systems, but to primary vs. secondary passwords.)
    • The Computer Journal , vol.36 , Issue.3 , pp. 227-237
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.