메뉴 건너뛰기




Volumn 10, Issue 1, 2012, Pages 28-36

A research agenda acknowledging the persistence of passwords

Author keywords

authentication alternatives; competing requirements; evaluation; passwords; supporting tools; systematic research

Indexed keywords

COMPETING REQUIREMENTS; EVALUATION; PASSWORDS; SUPPORTING TOOL; SYSTEMATIC RESEARCH;

EID: 84859800820     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2011.150     Document Type: Article
Times cited : (228)

References (18)
  • 2
    • 70350704929 scopus 로고    scopus 로고
    • Personal choice and challenge questions: A security and usability assessment
    • M. Just and D. Aspinall, "Personal Choice and Challenge Questions: A Security and Usability Assessment," Proc. 5th Symp. Usable Privacy and Security, ACM, 2009, pp. 1-11.
    • (2009) Proc. 5th Symp. Usable Privacy and Security, ACM , pp. 1-11
    • Just, M.1    Aspinall, D.2
  • 4
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication," Proc. IEEE, vol. 91, no. 12, 2003, pp. 2019-2040.
    • (2003) Proc. IEEE , vol.91 , Issue.12 , pp. 2019-2040
    • O'Gorman, L.1
  • 6
    • 84866496149 scopus 로고    scopus 로고
    • Graphical passwords: Learning from the first twelve years
    • R. Biddle, S. Chiasson, and P.C. van Oorschot, "Graphical Passwords: Learning from the First Twelve Years," to be published in ACM Computing Surveys, vol. 44, no. 4, 2012.
    • ACM Computing Surveys , vol.44 , Issue.4 , pp. 2012
    • Biddle, R.1    Chiasson, S.2    Van Oorschot, P.C.3
  • 7
  • 9
    • 79958097346 scopus 로고    scopus 로고
    • The password thicket: Technical and market failures in human authentication on the web
    • J. Bonneau and S. Preibusch, "The Password Thicket: Technical and Market Failures in Human Authentication on the Web," Proc. 9th Workshop Economics of Information Security (WEIS 10), 2010; http://weis2010.econinfosec. org/papers/session3/weis2010-bonneau.pdf.
    • (2010) Proc. 9th Workshop Economics of Information Security (WEIS 10)
    • Bonneau, J.1    Preibusch, S.2
  • 10
    • 84872025553 scopus 로고    scopus 로고
    • National strategy for trusted identities in cyberspace: Why we need it
    • "National Strategy for Trusted Identities in Cyberspace: Why We Need It," Nat'l Inst. Standards and Tech., 2011; www.nist.gov/nstic/NSTIC-Why- We-Need-It.pdf.
    • (2011) Nat'l Inst. Standards and Tech
  • 12
    • 77956066021 scopus 로고    scopus 로고
    • Internet Crime Complaint Center
    • 2009 Internet Crime Report, Internet Crime Complaint Center, 2010; www.ic3.gov/media/annualreport/2009-ic3report.pdf.
    • (2010) 2009 Internet Crime Report
  • 15
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: The rational rejection of security advice by users
    • C. Herley, "So Long, and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users," Proc. Workshop New Security Paradigms (NSPW 09), ACM, 2009, pp. 133-144.
    • (2009) Proc. Workshop New Security Paradigms (NSPW 09), ACM , pp. 133-144
    • Herley, C.1
  • 16
    • 78650022232 scopus 로고    scopus 로고
    • Testing metrics for password creation policies by attacking large sets of revealed passwords
    • M. Weir et al., "Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords," Proc. 17th ACM Conf. Computer and Comm. Security (CCS 10), ACM, 2010, pp. 162-175.
    • (2010) Proc. 17th ACM Conf. Computer and Comm. Security (CCS 10), ACM , pp. 162-175
    • Weir, M.1
  • 17
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • DOI 10.1109/MSP.2004.81
    • J. Yan et al., "Password Memorability and Security: Empirical Results," IEEE Security & Privacy, vol. 2, no. 5, 2004, pp. 25-31. (Pubitemid 40168623)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Alan, B.2    Anderson, R.3    Grant, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.