-
3
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop and D. V. Klein, "Improving system security via proactive password checking," Computers & Security, vol. 14, no. 3, pp. 233-249, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
8
-
-
35248846782
-
Password management strategies for online accounts
-
S. Gaw and E. W. Felten, "Password management strategies for online accounts," in Proc. SOUPS, 2006.
-
Proc. SOUPS, 2006
-
-
Gaw, S.1
Felten, E.W.2
-
9
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
R. Shay, S. Komanduri, P. Kelley, P. Leon, M. Mazurek, L. Bauer, N. Christin, and L. Cranor, "Encountering stronger password requirements: user attitudes and behaviors," in Proc. SOUPS '10, 2010.
-
Proc. SOUPS '10, 2010
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.3
Leon, P.4
Mazurek, M.5
Bauer, L.6
Christin, N.7
Cranor, L.8
-
10
-
-
85175132602
-
Password exhaustion: Predicting the end of password usefulness
-
L. St. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor, P. McDaniel, and T. Jaeger, "Password exhaustion: Predicting the end of password usefulness," in Proc. ICISS, 2006.
-
Proc. ICISS, 2006
-
-
St Clair, L.1
Johansen, L.2
Enck, W.3
Pirretti, M.4
Traynor, P.5
McDaniel, P.6
Jaeger, T.7
-
11
-
-
27544477471
-
-
NIST, Tech. Rep.
-
W. E. Burr, D. F. Dodson, and W. T. Polk, "Electronic authentication guideline," NIST, Tech. Rep., 2006.
-
(2006)
Electronic Authentication Guideline
-
-
Burr, W.E.1
Dodson, D.F.2
Polk, W.T.3
-
12
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
R. W. Proctor, M.-C. Lien, K.-P. L. Vu, E. E. Schultz, and G. Salvendy, "Improving computer security for authentication of users: Influence of proactive password restrictions," Behavior Res. Methods, Instruments, & Computers, vol. 34, no. 2, pp. 163-169, 2002.
-
(2002)
Behavior Res. Methods, Instruments, & Computers
, vol.34
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.-C.2
Vu, K.-P.L.3
Schultz, E.E.4
Salvendy, G.5
-
13
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern, "Testing metrics for password creation policies by attacking large sets of revealed passwords," in Proc. CCS, 2010.
-
Proc. CCS, 2010
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
14
-
-
79958094274
-
Who are the crowdworkers? Shifting demographics in Mechanical Turk
-
J. Ross, L. Irani, M. S. Silberman, A. Zaldivar, and B. Tomlinson, "Who are the crowdworkers? Shifting demographics in Mechanical Turk," in Proc. CHI EA, 2010.
-
Proc. CHI EA, 2010
-
-
Ross, J.1
Irani, L.2
Silberman, M.S.3
Zaldivar, A.4
Tomlinson, B.5
-
16
-
-
79960392344
-
Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data?
-
M. Buhrmester, T. Kwang, and S. D. Gosling, "Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data?" Perspectives on Psychological Science, vol. 6, no. 1, pp. 3-5, 2011.
-
(2011)
Perspectives on Psychological Science
, vol.6
, Issue.1
, pp. 3-5
-
-
Buhrmester, M.1
Kwang, T.2
Gosling, S.D.3
-
17
-
-
77956235582
-
Are your participants gaming the system? Screening Mechanical Turk workers
-
J. S. Downs, M. B. Holbrook, S. Sheng, and L. F. Cranor, "Are your participants gaming the system? Screening Mechanical Turk workers," in Proc. CHI, 2010.
-
Proc. CHI, 2010
-
-
Downs, J.S.1
Holbrook, M.B.2
Sheng, S.3
Cranor, L.F.4
-
19
-
-
84878363047
-
Utility of human-computer interactions: Toward a science of preference measurement
-
M. Toomim, T. Kriplean, C. Pörtner, and J. Landay, "Utility of human-computer interactions: toward a science of preference measurement," in Proc. CHI, 2011.
-
Proc. CHI, 2011
-
-
Toomim, M.1
Kriplean, T.2
Pörtner, C.3
Landay, J.4
-
20
-
-
74049149728
-
Multiple password interference in text passwords and click-based graphical passwords
-
S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle, "Multiple password interference in text passwords and click-based graphical passwords," in Proc. CCS, 2009.
-
Proc. CCS, 2009
-
-
Chiasson, S.1
Forget, A.2
Stobert, E.3
Van Oorschot, P.C.4
Biddle, R.5
-
24
-
-
78650009077
-
If your password is 123456, just make it hackme
-
January
-
A. Vance, "If your password is 123456, just make it hackme," New York Times, http://nyti.ms/w8NNwD, January 2010.
-
(2010)
New York Times
-
-
Vance, A.1
-
25
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek, "Password cracking using probabilistic context-free grammars," in Proc. IEEE Symposium on Security and Privacy, 2009.
-
Proc. IEEE Symposium on Security and Privacy, 2009
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
26
-
-
70350206950
-
Attitudes and practices of students towards password security
-
D. Hart, "Attitudes and practices of students towards password security," Journal of Computing Sciences in Colleges, vol. 23, no. 5, pp. 169-174, 2008.
-
(2008)
Journal of Computing Sciences in Colleges
, vol.23
, Issue.5
, pp. 169-174
-
-
Hart, D.1
-
27
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
A. Narayanan and V. Shmatikov, "Fast dictionary attacks on passwords using time-space tradeoff," in Proc. CCS, 2005.
-
Proc. CCS, 2005
-
-
Narayanan, A.1
Shmatikov, V.2
-
28
-
-
0033277446
-
Password security: An empirical study
-
M. Zviran and W. J. Haga, "Password security: an empirical study," J. Mgt. Info. Sys., vol. 15, no. 4, 1999.
-
(1999)
J. Mgt. Info. Sys.
, vol.15
, Issue.4
-
-
Zviran, M.1
Haga, W.J.2
-
30
-
-
84856150067
-
What's in a name? Evaluating statistical attacks on personal knowledge questions
-
J. Bonneau, M. Just, and G. Matthews, "What's in a name? Evaluating statistical attacks on personal knowledge questions," in Proc. Financial Crypto. 2010, 2010.
-
(2010)
Proc. Financial Crypto. 2010
-
-
Bonneau, J.1
Just, M.2
Matthews, G.3
-
31
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
Y. Zhang, F. Monrose, and M. K. Reiter, "The security of modern password expiration: an algorithmic framework and empirical analysis," in Proc. CCS, 2010.
-
Proc. CCS, 2010
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
-
32
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
DOI 10.1016/j.ijhcs.2007.03.007, PII S1071581907000560
-
K.-P. L. Vu, R. W. Proctor, A. Bhargav-Spantzel, B.-L. B. Tai, and J. Cook, "Improving password security and memorability to protect personal and organizational information," Int. J. of Human-Comp. Studies, vol. 65, no. 8, pp. 744-757, 2007. (Pubitemid 46824074)
-
(2007)
International Journal of Human Computer Studies
, vol.65
, Issue.8
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.4
Cook, J.5
Eugene, S.E.6
-
34
-
-
77953963809
-
The true cost of unusable password policies: Password use in the wild
-
P. Inglesant and M. A. Sasse, "The true cost of unusable password policies: password use in the wild," in Proc. ACM CHI'10, 2010, pp. 383-392.
-
Proc. ACM CHI'10, 2010
, pp. 383-392
-
-
Inglesant, P.1
Sasse, M.A.2
-
35
-
-
68449103390
-
Password policy simulation and analysis
-
R. Shay, A. Bhargav-Spantzel, and E. Bertino, "Password policy simulation and analysis," in ACM workshop on Digital identity management, 2007, pp. 1-10.
-
ACM Workshop on Digital Identity Management, 2007
, pp. 1-10
-
-
Shay, R.1
Bhargav-Spantzel, A.2
Bertino, E.3
-
36
-
-
68449088124
-
A comprehensive simulation tool for the analysis of password policies
-
R. Shay and E. Bertino, "A comprehensive simulation tool for the analysis of password policies," Int. J. Info. Sec., vol. 8, no. 4, pp. 275-289, 2009.
-
(2009)
Int. J. Info. Sec.
, vol.8
, Issue.4
, pp. 275-289
-
-
Shay, R.1
Bertino, E.2
-
37
-
-
17844366573
-
Analysis of end user security behaviors
-
J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton, "Analysis of end user security behaviors," Comp. & Security, vol. 24, no. 2, pp. 124 -133, 2005.
-
(2005)
Comp. & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
39
-
-
85071080463
-
Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
-
S. Schechter, C. Herley, and M. Mitzenmacher, "Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks," in Proc. HotSec'10, 2010.
-
Proc. HotSec'10, 2010
-
-
Schechter, S.1
Herley, C.2
Mitzenmacher, M.3
-
40
-
-
84940644968
-
A mathematical theory of communication
-
C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
43
-
-
38849143105
-
Advances in password cracking
-
S. Marechal, "Advances in password cracking," Journal in Computer Virology, vol. 4, no. 1, pp. 73-81, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.1
, pp. 73-81
-
-
Marechal, S.1
-
46
-
-
84874875222
-
Of passwords and people: Measuring the effect of password-composition policies
-
S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman, "Of passwords and people: Measuring the effect of password-composition policies," in Proc. CHI, 2011.
-
Proc. CHI, 2011
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
49
-
-
85030321143
-
MapReduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat, "MapReduce: Simplified data processing on large clusters," in Proc. OSDI, 2004.
-
Proc. OSDI, 2004
-
-
Dean, J.1
Ghemawat, S.2
-
50
-
-
84944486544
-
Prediction and entropy of printed english
-
C. E. Shannon, "Prediction and entropy of printed english," Bell Systems Tech. J., vol. 30, 1951.
-
(1951)
Bell Systems Tech. J.
, vol.30
-
-
Shannon, C.E.1
|