-
1
-
-
84865001966
-
Why I hate Mechanical Turk research (and workshops)
-
E. Adar. Why I hate Mechanical Turk research (and workshops). CHI 2011.
-
(2011)
CHI
-
-
Adar, E.1
-
2
-
-
84871236752
-
Spelling-error tolerant, order-independent pass-phrases via the Damerau-Levenshtein string-edit distance metric
-
(ACSW'07), Australian Computer Society
-
G.V. Bard. Spelling-error tolerant, order-independent pass-phrases via the Damerau-Levenshtein string-edit distance metric. Proc. of 5th Australasian Symposium on ACSW Frontiers - volume 68 (ACSW'07), pp.117-124. Australian Computer Society, 2007.
-
(2007)
Proc. of 5th Australasian Symposium on ACSW Frontiers
, vol.68
, pp. 117-124
-
-
Bard, G.V.1
-
3
-
-
0021470294
-
User-friendly password methods for computer-mediated information systems
-
B.F. Barton, M.S. Barton. User-friendly password methods for computer-mediated information systems. Computers & Security v.3(1984):186-195.
-
(1984)
Computers & Security
, vol.3
, pp. 186-195
-
-
Barton, B.F.1
Barton, M.S.2
-
4
-
-
80051718604
-
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects
-
Sept.
-
R. Biddle, M. Mannan, P.C. van Oorschot, T. Whalen. User Study, Analysis, and Usable Security of Passwords Based on Digital Objects. IEEE Trans. Info. Forensics and Security 6(3):970-979, Sept. 2011.
-
(2011)
IEEE Trans. Info. Forensics and Security
, vol.6
, Issue.3
, pp. 970-979
-
-
Biddle, R.1
Mannan, M.2
Van Oorschot, P.C.3
Whalen, T.4
-
5
-
-
84866496149
-
Graphical Passwords: Learning from the First Twelve Years
-
to appear
-
R. Biddle, S. Chiasson, P.C. van Oorschot. Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys 44(4), 2012 (to appear).
-
(2012)
ACM Computing Surveys
, vol.44
, Issue.4
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.C.3
-
7
-
-
85095974472
-
Evaluating the usability and security of a graphical one-time PIN system
-
S. Brostoff, P. Inglesant, and M. A. Sasse. Evaluating the usability and security of a graphical one-time PIN system. BCS-HCI 2010.
-
(2010)
BCS-HCI
-
-
Brostoff, S.1
Inglesant, P.2
Sasse, M.A.3
-
9
-
-
84855641679
-
Rethinking passwords. Invited talk, USENIX LISA 2010 (slides available online)
-
See also summary by Rik Farrow, ; April
-
B. Cheswick. Rethinking passwords. Invited talk, USENIX LISA 2010 (slides available online). See also summary by Rik Farrow, ;login: (USENIX Magazine) 36(2):68-69, April 2011.
-
(2011)
Login: (USENIX Magazine)
, vol.36
, Issue.2
, pp. 68-69
-
-
Cheswick, B.1
-
11
-
-
84855689530
-
-
MVP: A web-based framework for user studies in authentication (poster)
-
S. Chiasson, C. Deschamps, M. Hlywa, G. Chan, E. Stobert, R. Biddle. MVP: A web-based framework for user studies in authentication (poster). SOUPS 2010.
-
(2010)
SOUPS
-
-
Chiasson, S.1
Deschamps, C.2
Hlywa, M.3
Chan, G.4
Stobert, E.5
Biddle, R.6
-
12
-
-
84856260670
-
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
-
to appear, or later
-
S. Chiasson, E. Stobert, A. Forget, R. Biddle, P.C. van Oorschot. Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Trans. Dependable and Secure Computing (to appear, 2011 or later).
-
(2011)
IEEE Trans. Dependable and Secure Computing
-
-
Chiasson, S.1
Stobert, E.2
Forget, A.3
Biddle, R.4
Van Oorschot, P.C.5
-
13
-
-
70349562717
-
Exploring the Use of Discrete Gestures for Authentication
-
INTERACT 2009, Part II, Springer
-
M.K. Chong, G. Marsden. Exploring the Use of Discrete Gestures for Authentication. INTERACT 2009, Part II, Springer LNCS 5727, pp.205-213, 2009.
-
(2009)
LNCS
, vol.5727
, pp. 205-213
-
-
Chong, M.K.1
Marsden, G.2
-
14
-
-
81055156896
-
A Closer Look at Recognition-Based Graphical Passwords on Mobile Devices
-
P. Dunphy, A.P. Heiner, N. Asokan. A Closer Look at Recognition-Based Graphical Passwords on Mobile Devices. SOUPS 2010.
-
(2010)
SOUPS
-
-
Dunphy, P.1
Heiner, A.P.2
Asokan, N.3
-
15
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, R. Chandramouli. Proposed NIST standard for role-based access control. ACM TISSEC 4(3):224-274, 2001.
-
(2001)
ACM TISSEC
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
20
-
-
50249129707
-
Towards identifying usability and security features of graphical password in knowledge based authentication technique
-
IEEE
-
M.D. Hafiz, A.H. Abdullah, N. Ithnin, and H.K. Mammi. Towards identifying usability and security features of graphical password in knowledge based authentication technique. 2nd Asia Int'l Conf. Modelling & Simulation (2008), 396-403, IEEE.
-
(2008)
2nd Asia Int'l Conf. Modelling & Simulation
, pp. 396-403
-
-
Hafiz, M.D.1
Abdullah, A.H.2
Ithnin, N.3
Mammi, H.K.4
-
23
-
-
84855687317
-
-
personal communication, May
-
M. Jakobsson, personal communication, May 2011.
-
(2011)
-
-
Jakobsson, M.1
-
24
-
-
0024771499
-
A survey of password mechanisms: Weaknesses and potential improvements (Part 1)
-
D.L. Jobusch, A.E. Oldehoeft. A survey of password mechanisms: weaknesses and potential improvements (Part 1). Computers & Security v.8(1989):587-604.
-
(1989)
Computers & Security
, vol.8
, pp. 587-604
-
-
Jobusch, D.L.1
Oldehoeft, A.E.2
-
25
-
-
0024777503
-
A survey of password mechanisms: Weaknesses and potential improvements (Part 2)
-
D.L. Jobusch, A.E. Oldehoeft. A survey of password mechanisms: weaknesses and potential improvements (Part 2). Computers & Security v.8(1989):675-689.
-
(1989)
Computers & Security
, vol.8
, pp. 675-689
-
-
Jobusch, D.L.1
Oldehoeft, A.E.2
-
26
-
-
35248895598
-
Human selection of mnemonic phrase-based passwords
-
C. Kuo, S. Romanosky, L.F. Cranor. Human selection of mnemonic phrase-based passwords. SOUPS 2006.
-
(2006)
SOUPS
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
28
-
-
85011627924
-
Why is there no science in cyber science?
-
panel report
-
R. Maxion, T. Longstaff, J. McHugh. Why is there no science in cyber science? NSPW 2010 (panel report).
-
(2010)
NSPW
-
-
Maxion, R.1
Longstaff, T.2
McHugh, J.3
-
29
-
-
33750300671
-
Improving Usability Through Password-Corrective Hashing
-
SPIRE 2006: String Processing and Info. Retrieval, 13th International Conference. Springer
-
A. Mehler, S. Skiena. Improving Usability Through Password-Corrective Hashing. SPIRE 2006: String Processing and Info. Retrieval, 13th International Conference. LNCS 4209, pp.193-204, Springer, 2006.
-
(2006)
LNCS
, vol.4209
, pp. 193-204
-
-
Mehler, A.1
Skiena, S.2
-
31
-
-
77954001520
-
Electronic Authentication Guideline
-
Gaithersburg, April
-
NIST Special Pub. 800-63-1 (W. Burr, D. Dodson, R. Perlner, W. Polk, S. Gupta, E. Nabbus). Electronic Authentication Guideline. Gaithersburg, April, 2006.
-
(2006)
NIST Special Pub. 800-63-1
-
-
Burr, W.1
Dodson, D.2
Perlner, R.3
Polk, W.4
Gupta, S.5
Nabbus, E.6
-
34
-
-
84855687318
-
A Gesture-based Authentication Scheme for Untrusted Public Terminals
-
S.N. Patel, J.S. Pierce, F.D. Abowd. A Gesture-based Authentication Scheme for Untrusted Public Terminals. ACM UIST'04.
-
ACM UIST'04
-
-
Patel, S.N.1
Pierce, J.S.2
Abowd, F.D.3
-
35
-
-
6144253216
-
Strong Inference
-
Oct.16
-
J.R. Platt. Strong Inference. Science 136(3642): 347-353 (Oct.16, 1964).
-
(1964)
Science
, vol.136
, Issue.3642
, pp. 347-353
-
-
Platt, J.R.1
-
36
-
-
0019895650
-
A password extension for improved human factors
-
S.N. Porter. A password extension for improved human factors. Computers & Security v.1(1982):54-56.
-
(1982)
Computers & Security
, vol.1
, pp. 54-56
-
-
Porter, S.N.1
-
38
-
-
4544282487
-
Information security: The state of science, pseudoscience, and flying pigs
-
invited essay
-
R. Schell. Information security: the state of science, pseudoscience, and flying pigs. ACSAC 2001 (invited essay).
-
(2001)
ACSAC
-
-
Schell, R.1
-
40
-
-
0028406329
-
Pass-sentence-a new-approach to computer code
-
Y. Spector, J. Ginzberg. Pass-sentence-a new-approach to computer code. Computers & Security v.13(1994):145-160.
-
(1994)
Computers & Security
, vol.13
, pp. 145-160
-
-
Spector, Y.1
Ginzberg, J.2
-
42
-
-
78650022232
-
Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords
-
M. Weir, S. Aggarwal, M. Collins, H. Stern. Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords. ACM CCS 2010.
-
(2010)
ACM CCS
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
43
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, N. Memon. PassPoints: Design and longitudinal evaluation of a graphical password system. Int'l J. Human-Computer Studies 63(1-2), 2005.
-
(2005)
Int'l J. Human-Computer Studies
, vol.63
, Issue.1-2
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
-
44
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson, A. Grant. Password memorability and security: empirical results. IEEE Security and Privacy magazine 2(5):25-31, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
45
-
-
78650011800
-
The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis
-
Y. Zhang, F. Monrose, M.K. Reiter. The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis. ACM CCS 2010.
-
(2010)
ACM CCS
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
-
47
-
-
0003369812
-
A comparison of password techniques for multilevel authentication mechanisms
-
Updates report NPS-54-90-014 (June 1990), Naval Postgraduate School, Monterey, California. (Note: the term multilevel here relates not to MLS operating systems, but to primary vs. secondary passwords.)
-
M. Zviran, W.J. Haga. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal 36(3):227-237. Updates report NPS-54-90-014 (June 1990), Naval Postgraduate School, Monterey, California. (Note: the term multilevel here relates not to MLS operating systems, but to primary vs. secondary passwords.)
-
The Computer Journal
, vol.36
, Issue.3
, pp. 227-237
-
-
Zviran, M.1
Haga, W.J.2
|