-
1
-
-
4243096135
-
The domino effect of password reuse
-
B. Ives, K. R. Walsh, and H. Schneider, "The domino effect of password reuse," Commun. ACM, vol. 47, no. 4, pp. 75-78, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
3
-
-
35348884906
-
A large-scale study of web password habits
-
New York, ACM
-
D. Florencio and C. Herley, "A large-scale study of web password habits," in WWW '07: Proc. 16th Int. Conf. World Wide Web., New York, 2007, pp. 657-666, ACM.
-
(2007)
WWW '07: Proc. 16th Int. Conf. World Wide Web.
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
4
-
-
74049149728
-
Multiple password interference in text passwords and click-based graphical passwords
-
New York, ACM
-
S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle, "Multiple password interference in text passwords and click-based graphical passwords," in CCS '09: Proc. 16th ACM Conf. Computer Communications Security, New York, 2009, pp. 500-511, ACM.
-
(2009)
CCS '09: Proc. 16th ACM Conf. Computer Communications Security
, pp. 500-511
-
-
Chiasson, S.1
Forget, A.2
Stobert, E.3
Van Oorschot, P.C.4
Biddle, R.5
-
5
-
-
85084161999
-
The design and analysis of graphical passwords
-
Berkeley, CA, USENIX Association
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The design and analysis of graphical passwords," in SSYM'99: Proc. 8th Conf. USENIX Security Symp., Berkeley, CA, 1999, pp. 1-1, USENIX Association.
-
(1999)
SSYM'99: Proc. 8th Conf. USENIX Security Symp.
, pp. 1-1
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
8
-
-
19944381937
-
Passpoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "Passpoints: Design and longitudinal evaluation of a graphical password system," Int. J. Human-Computer Studies, vol. 63, no. 1-2, pp. 102-127, 2005.
-
(2005)
Int. J. Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
9
-
-
34247167942
-
Design and evaluation of a shoulder-surfing resistant graphical password scheme
-
New York, ACM
-
S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget, "Design and evaluation of a shoulder-surfing resistant graphical password scheme," in AVI '06: Proc. Working Conf. Advanced Visual Interfaces, New York, 2006, pp. 177-184, ACM.
-
(2006)
AVI '06: Proc. Working Conf. Advanced Visual Interfaces
, pp. 177-184
-
-
Wiedenbeck, S.1
Waters, J.2
Sobrado, L.3
Birget, J.-C.4
-
10
-
-
0038687701
-
Securing passwords against dictionary attacks
-
New York, ACM
-
B. Pinkas and T. Sander, "Securing passwords against dictionary attacks," in CCS '02: Proc. 9th ACM Conf. Computer Communications Security, New York, 2002, pp. 161-170, ACM.
-
(2002)
CCS '02: Proc. 9th ACM Conf. Computer Communications Security
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
11
-
-
33745886578
-
A convenient method for securely managing passwords
-
New York, ACM
-
J. A. Halderman, B. Waters, and E. W. Felten, "A convenient method for securely managing passwords," in WWW '05: Proc. 14th Int. Conf. World Wide Web, New York, 2005, pp. 471-479, ACM.
-
(2005)
WWW '05: Proc. 14th Int. Conf. World Wide Web
, pp. 471-479
-
-
Halderman, J.A.1
Waters, B.2
Felten, E.W.3
-
12
-
-
34250747969
-
Passpet: Convenient password management and phishing protection
-
New York, ACM
-
K.-P. Yee and K. Sitaker, "Passpet: Convenient password management and phishing protection," in SOUPS '06: Proc. 2nd Symp. Usable Privacy Security, New York, 2006, pp. 32-43, ACM.
-
(2006)
SOUPS '06: Proc. 2nd Symp. Usable Privacy Security
, pp. 32-43
-
-
Yee, K.-P.1
Sitaker, K.2
-
13
-
-
36849075238
-
A second look at the usability of click-based graphical passwords
-
New York, ACM
-
S. Chiasson, R. Biddle, and P. C. van Oorschot, "A second look at the usability of click-based graphical passwords," in SOUPS '07: Proc. 3rd Symp. Usable Privacy Security, New York, 2007, pp. 1-12, ACM.
-
(2007)
SOUPS '07: Proc. 3rd Symp. Usable Privacy Security
, pp. 1-12
-
-
Chiasson, S.1
Biddle, R.2
Van Oorschot, P.C.3
-
14
-
-
84892465782
-
A comprehensive study of frequency, interference, and training of multiple graphical passwords
-
New York, ACM
-
K. M. Everitt, T. Bragin, J. Fogarty, and T. Kohno, "A comprehensive study of frequency, interference, and training of multiple graphical passwords," in CHI '09: Proc. 27th Int. Conf. Human Factors Computing Systems, New York, 2009, pp. 889-898, ACM.
-
(2009)
CHI '09: Proc. 27th Int. Conf. Human Factors Computing Systems
, pp. 889-898
-
-
Everitt, K.M.1
Bragin, T.2
Fogarty, J.3
Kohno, T.4
-
15
-
-
85084163855
-
Graphical dictionaries and thememorable space of graphical passwords
-
Berkeley, CA, USENIX Association
-
J. Thorpe and P. C. van Oorschot, "Graphical dictionaries and thememorable space of graphical passwords," in SSYM'04: Proc. 13th Conf. USENIX Security Symp., Berkeley, CA, 2004, pp. 10-10, USENIX Association.
-
(2004)
SSYM'04: Proc. 13th Conf. USENIX Security Symp.
, pp. 10-10
-
-
Thorpe, J.1
Van Oorschot, P.C.2
-
16
-
-
85049042638
-
Human-seeded attacks and exploiting hot-spots in graphical passwords
-
Berkeley, CA, USENIX Association
-
J. Thorpe and P. C. van Oorschot, "Human-seeded attacks and exploiting hot-spots in graphical passwords," in SS'07: Proc. 16th USENIX Security Symp. USENIX Security, Berkeley, CA, 2007, pp. 1-16, USENIX Association.
-
(2007)
SS'07: Proc. 16th USENIX Security Symp. USENIX Security
, pp. 1-16
-
-
Thorpe, J.1
Van Oorschot, P.C.2
-
17
-
-
77955677817
-
Purely automated attacks on passpoints-style graphical passwords
-
Sep.
-
P. van Oorschot, A. Salehi-Abari, and J. Thorpe, "Purely automated attacks on passpoints-style graphical passwords," IEEE Trans. Information Forensics Security, vol. 5, no. 3, pp. 393-405, Sep. 2010.
-
(2010)
IEEE Trans. Information Forensics Security
, vol.5
, Issue.3
, pp. 393-405
-
-
Van Oorschot, P.1
Salehi-Abari, A.2
Thorpe, J.3
-
18
-
-
33745816410
-
Why phishing works
-
New York, ACM
-
R. Dhamija, J. D. Tygar, andM. Hearst, "Why phishing works," in CHI '06: Proc. SIGCHI Conf. Human Factors Computing Systems, New York, 2006, pp. 581-590, ACM.
-
(2006)
CHI '06: Proc. SIGCHI Conf. Human Factors Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
19
-
-
77952370957
-
Dynamic pharming attacks and locked same-origin policies for web browsers
-
NewYork, ACM
-
C.Karlof,U. Shankar, J. D.Tygar, andD.Wagner, "Dynamic pharming attacks and locked same-origin policies for web browsers," in CCS '07: Proc. 14th ACMConf. Computer Communications Security, NewYork, 2007, pp. 58-71, ACM.
-
(2007)
CCS '07: Proc. 14th ACMConf. Computer Communications Security
, pp. 58-71
-
-
Karlof, C.1
Shankar, U.2
Tygar, J.D.3
Wagner, D.4
-
20
-
-
78649809598
-
Learning more about the underground economy:Acase-study of keyloggers and dropzones
-
T. Holz, M. Engelberth, and F. Freiling, "Learning more about the underground economy:Acase-study of keyloggers and dropzones," Proc. Computer Security ESORICS 2009, pp. 1-18, 2010.
-
(2010)
Proc. Computer Security ESORICS
, vol.2009
, pp. 1-18
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.3
-
21
-
-
85080711655
-
The ghost in the browser: Analysis of web-based malware
-
Berkeley, CA
-
N. Provos, D. Mcnamee, P. Mavrommatis, K. Wang, and N. Modadugu, "The ghost in the browser: Analysis of web-based malware," in Proc. 1st Conf. Workshop Hot Topics in Understanding Botnets, Berkeley, CA, 2007.
-
(2007)
Proc. 1st Conf. Workshop Hot Topics in Understanding Botnets
-
-
Provos, N.1
Mcnamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
22
-
-
84863357361
-
-
Phishing Activity Trends Rep. [Online]. Available
-
Phishing Activity Trends Rep., 2nd Quarter/2010 Anti-Phishing Working Group [Online]. Available: http://www.antiphishing.org/
-
2nd Quarter/2010 Anti-Phishing Working Group
-
-
-
23
-
-
33750059168
-
Phoolproof phishing prevention
-
B. Parno, C. Kuo, and A. Perrig, "Phoolproof phishing prevention," Financial Cryptography Data Security, pp. 1-19, 2006.
-
(2006)
Financial Cryptography Data Security
, pp. 1-19
-
-
Parno, B.1
Kuo, C.2
Perrig, A.3
-
24
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
New York, ACM
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: Capturing system-wide information flow for malware detection and analysis," in CCS '07: Proc.e 14th ACM Conf. Computer Communications Security, New York, 2007, pp. 116-127, ACM.
-
(2007)
CCS '07: Proc.e 14th ACM Conf. Computer Communications Security
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
25
-
-
57349173947
-
Trustworthy and personalized computing on public kiosks
-
ACM
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang, "Trustworthy and personalized computing on public kiosks," in Proc. 6th Int. Conf. Mobile Systems, Applications Services, 2008, pp. 199-210, ACM.
-
(2008)
Proc. 6th Int. Conf. Mobile Systems, Applications Services
, pp. 199-210
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
26
-
-
84871631323
-
-
[Online]. Available
-
RSA SecureID [Online]. Available: http://www.rsa.com/node. aspx?id=1156/
-
RSA SecureID
-
-
-
27
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
Dec.
-
L. O'Gorman, "Comparing passwords, tokens, and biometrics for user authentication," Proc. IEEE, vol. 91, no. 12, pp. 2021-2040, Dec. 2003.
-
(2003)
Proc. IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'Gorman, L.1
-
28
-
-
0019634370
-
Password authentication with insecure communication
-
Nov.
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, pp. 770-772, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
29
-
-
84908683107
-
Security analysis of SHA-256 and sisters
-
Springer
-
H. Gilbert and H. Handschuh, "Security analysis of SHA-256 and sisters," in Selected Areas Cryptography, 2003, pp. 175-193, Springer.
-
(2003)
Selected Areas Cryptography
, pp. 175-193
-
-
Gilbert, H.1
Handschuh, H.2
-
31
-
-
38549103537
-
-
I. T. Report, ITU Internet Rep. 2006, [Online]. Available
-
I. T. Report, ITU Internet Rep. 2006: Digital.Life [Online]. Available: http://www.itu.int/
-
Digital.Life
-
-
-
34
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Berkeley, CA, USENIX Association
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell, "Stronger password authentication using browser extensions," in SSYM'05: Proc. 14th Conf. USENIX Security Symp., Berkeley, CA, 2005, pp. 2-2, USENIX Association.
-
(2005)
SSYM'05: Proc. 14th Conf. USENIX Security Symp.
, pp. 2-2
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
35
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm," Advances Cryptology-ASIACRYPT 2000, pp. 531-545, 2000.
-
(2000)
Advances Cryptology-ASIACRYPT
, vol.2000
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
36
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
-
H. Krawczyk, "The order of encryption and authentication for protecting communications (or: How secure is SSL?)," in Advances Cryptology- CRYPTO 2001, 2001, pp. 310-331.
-
(2001)
Advances Cryptology- CRYPTO 2001
, pp. 310-331
-
-
Krawczyk, H.1
-
39
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
New York, ACM
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern, "Testing metrics for password creation policies by attacking large sets of revealed passwords," in Proc. 17th ACM Conf. Computer Communications Security, New York, 2010, pp. 162-175, ACM.
-
(2010)
Proc. 17th ACM Conf. Computer Communications Security
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
42
-
-
33745587007
-
Conditional estimators: An effective attack on A5/1
-
NewYork: Springer
-
E. Barkan and E. Biham, "Conditional estimators: An effective attack on A5/1," in Selected Areas in Cryptography. NewYork:Springer, 2006, pp. 1-19.
-
(2006)
Selected Areas in Cryptography
, pp. 1-19
-
-
Barkan, E.1
Biham, E.2
-
43
-
-
38549118817
-
Using a personal device to strengthen password authentication from an untrusted computer
-
M. Mannan and P. van Oorschot, "Using a personal device to strengthen password authentication from an untrusted computer," Financial Cryptography Data Security, pp. 88-103, 2007.
-
(2007)
Financial Cryptography Data Security
, pp. 88-103
-
-
Mannan, M.1
Van Oorschot, P.2
-
44
-
-
85077302433
-
Bump in the ether: A framework for securing sensitive user input
-
J.McCune, A. Perrig, andM. Reiter, "Bump in the ether: A framework for securing sensitive user input," in USENIX Annu. Tech. Conf., 2006, pp. 185-198.
-
(2006)
USENIX Annu. Tech. Conf.
, pp. 185-198
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
45
-
-
70450194695
-
SessionMagnifier: A simple approach to secure and convenient kiosk browsing
-
ACM
-
C. Yue and H. Wang, "SessionMagnifier: A simple approach to secure and convenient kiosk browsing," in Proc. 11th Int. Conf. Ubiquitous Computing, 2009, pp. 125-134, ACM.
-
(2009)
Proc. 11th Int. Conf. Ubiquitous Computing
, pp. 125-134
-
-
Yue, C.1
Wang, H.2
-
46
-
-
85034040740
-
Perspectives: Improving ssh-style host authentication with multi-path probing
-
Berkeley, CA, USENIX Association
-
D. Wendlandt, D. G. Andersen, and A. Perrig, "Perspectives: Improving ssh-style host authentication with multi-path probing," in Proc. USENIX 2008 Annu. Tech. Conf., Berkeley, CA, 2008, pp. 321-334, USENIX Association.
-
(2008)
Proc. USENIX 2008 Annu. Tech. Conf.
, pp. 321-334
-
-
Wendlandt, D.1
Andersen, D.G.2
Perrig, A.3
-
47
-
-
34548786769
-
Emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, "Emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies," in Proc. 2007 IEEE Symp. Security Privacy, 2007.
-
(2007)
Proc. 2007 IEEE Symp. Security Privacy
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
48
-
-
80755186276
-
Graphical passwords: Learning from the first twelve years
-
Carleton Univ.
-
R. Biddle, S. Chiasson, and P. van Oorschot, "Graphical passwords: Learning from the first twelve years," in ACM Computing Surveys, Carleton Univ., 2010.
-
(2010)
ACM Computing Surveys
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.3
|