-
2
-
-
70350704929
-
Personal choice and challenge questions: A security and usability assessment
-
M. Just and D. Aspinall, "Personal Choice and Challenge Questions: A Security and Usability Assessment," Proc. 5th Symp. Usable Privacy and Security, ACM, 2009, pp. 1-11.
-
(2009)
Proc. 5th Symp. Usable Privacy and Security, ACM
, pp. 1-11
-
-
Just, M.1
Aspinall, D.2
-
4
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication," Proc. IEEE, vol. 91, no. 12, 2003, pp. 2019-2040.
-
(2003)
Proc. IEEE
, vol.91
, Issue.12
, pp. 2019-2040
-
-
O'Gorman, L.1
-
6
-
-
84866496149
-
Graphical passwords: Learning from the first twelve years
-
R. Biddle, S. Chiasson, and P.C. van Oorschot, "Graphical Passwords: Learning from the First Twelve Years," to be published in ACM Computing Surveys, vol. 44, no. 4, 2012.
-
ACM Computing Surveys
, vol.44
, Issue.4
, pp. 2012
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.C.3
-
7
-
-
78751558943
-
A billion keys, but few locks: The crisis of web single sign-on
-
S.-T. Sun et al., "A Billion Keys, but Few Locks: The Crisis of Web Single Sign-on," Proc. Workshop New Security Paradigms (NSPW 10), ACM, 2010, pp. 61-72.
-
(2010)
Proc. Workshop New Security Paradigms (NSPW 10), ACM
, pp. 61-72
-
-
Sun, S.-T.1
-
8
-
-
80052801173
-
A usability study and critique of two password managers
-
Usenix
-
S. Chiasson, P.C. van Oorschot, and R. Biddle, "A Usability Study and Critique of Two Password Managers," Proc. 15th Usenix Security Symp., Usenix, 2006, pp. 1-16.
-
(2006)
Proc. 15th Usenix Security Symp.
, pp. 1-16
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
9
-
-
79958097346
-
The password thicket: Technical and market failures in human authentication on the web
-
J. Bonneau and S. Preibusch, "The Password Thicket: Technical and Market Failures in Human Authentication on the Web," Proc. 9th Workshop Economics of Information Security (WEIS 10), 2010; http://weis2010.econinfosec. org/papers/session3/weis2010-bonneau.pdf.
-
(2010)
Proc. 9th Workshop Economics of Information Security (WEIS 10)
-
-
Bonneau, J.1
Preibusch, S.2
-
10
-
-
84872025553
-
National strategy for trusted identities in cyberspace: Why we need it
-
"National Strategy for Trusted Identities in Cyberspace: Why We Need It," Nat'l Inst. Standards and Tech., 2011; www.nist.gov/nstic/NSTIC-Why- We-Need-It.pdf.
-
(2011)
Nat'l Inst. Standards and Tech
-
-
-
11
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
Y. Zhang, F. Monrose, and M.K. Reiter, "The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis," Proc. 17th ACM Conf. Computer and Comm. Security (CCS 10), ACM, 2010, pp. 176-186.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security (CCS 10), ACM
, pp. 176-186
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
-
12
-
-
77956066021
-
-
Internet Crime Complaint Center
-
2009 Internet Crime Report, Internet Crime Complaint Center, 2010; www.ic3.gov/media/annualreport/2009-ic3report.pdf.
-
(2010)
2009 Internet Crime Report
-
-
-
15
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
C. Herley, "So Long, and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users," Proc. Workshop New Security Paradigms (NSPW 09), ACM, 2009, pp. 133-144.
-
(2009)
Proc. Workshop New Security Paradigms (NSPW 09), ACM
, pp. 133-144
-
-
Herley, C.1
-
16
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
M. Weir et al., "Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords," Proc. 17th ACM Conf. Computer and Comm. Security (CCS 10), ACM, 2010, pp. 162-175.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security (CCS 10), ACM
, pp. 162-175
-
-
Weir, M.1
-
17
-
-
12844275960
-
Password memorability and security: Empirical results
-
DOI 10.1109/MSP.2004.81
-
J. Yan et al., "Password Memorability and Security: Empirical Results," IEEE Security & Privacy, vol. 2, no. 5, 2004, pp. 25-31. (Pubitemid 40168623)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Alan, B.2
Anderson, R.3
Grant, A.4
|