-
2
-
-
0034140877
-
Protecting secret keys with personal entropy
-
Feb
-
C. M. Ellison, C. Hall, R. Milbert, and B. Schneier. Protecting secret keys with personal entropy. Future Generation Computer Systems, 16(4), Feb. 2000.
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
-
-
Ellison, C. M.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
4
-
-
85044211678
-
Do strong web passwords accomplish anything?
-
Boston, MA, USA, Aug
-
D. Florêncio, C. Herley, and B. Coskun. Do strong web passwords accomplish anything? In USENIX Workshop on Hot Topics in Security (HotSec'07), Boston, MA, USA, Aug. 2007.
-
(2007)
USENIX Workshop on Hot Topics in Security (HotSec'07)
-
-
Florêncio, D.1
Herley, C.2
Coskun, B.3
-
5
-
-
65449177711
-
Improving text passwords through persua- sion
-
Pittsburgh, PA, USA, July
-
A. Forget, S. Chiasson, P. van Oorschot, and R. Bid- dle. Improving text passwords through persua- sion. In Symposium on Usable Privacy and Security (SOUPS'08), Pittsburgh, PA, USA, July 2008.
-
(2008)
Symposium on Usable Privacy and Security (SOUPS'08)
-
-
Forget, A.1
Chiasson, S.2
van Oorschot, P.3
Bid- dle, R.4
-
6
-
-
15744372544
-
Authenticating ourselves: will we ever es- cape the password?
-
S. Furnell. Authenticating ourselves: will we ever es- cape the password? Network Security, 2005(3).
-
(2005)
Network Security
, Issue.3
-
-
Furnell, S.1
-
7
-
-
77955219345
-
Messin' with Texas, deriving mother's maiden names using public records
-
New York, NY, USA, June
-
V. Griffith and M. Jakobsson. Messin' with Texas, deriving mother's maiden names using public records. In Applied Cryptography and Network Secu- rity (ACNS'05), New York, NY, USA, June 2005.
-
(2005)
Applied Cryptography and Network Secu- rity (ACNS'05)
-
-
Griffith, V.1
Jakobsson, M.2
-
10
-
-
35248895598
-
Human se- lection of mnemonic phrase-based passwords
-
Pittsburgh, PA, USA, July
-
C. Kuo, S. Romanosky, and L. F. Cranor. Human se- lection of mnemonic phrase-based passwords. In Sym- posium On Usable Privacy and Security (SOUPS'06), Pittsburgh, PA, USA, July 2006.
-
(2006)
Sym- posium On Usable Privacy and Security (SOUPS'06)
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L. F.3
-
11
-
-
85091954795
-
-
MacDevCenter.com. (Feb. 22)
-
MacDevCenter.com. How Paris got hacked? News article (Feb. 22, 2005), http://www.macdevcenter. com/pub/a/mac/2005/01/01/paris.html.
-
(2005)
How Paris got hacked? News article
-
-
-
13
-
-
84869109009
-
-
Microsoft. Online article (Mar. 22)
-
Microsoft. Strong passwords: How to create and use them. Online article (Mar. 22, 2006). http://www.microsoft.com/protect/yourself/ password/create.mspx.
-
(2006)
Strong passwords: How to create and use them
-
-
-
16
-
-
84901922498
-
Monitoring corporate password sharing using social network analysis
-
St. Pete Beach, Florida, USA, Jan
-
A. S. Patrick. Monitoring corporate password sharing using social network analysis. In International Sunbelt Social Network Conference, St. Pete Beach, Florida, USA, Jan. 2008.
-
(2008)
International Sunbelt Social Network Conference
-
-
Patrick, A. S.1
-
17
-
-
65449137148
-
Personal knowledge questions for fallback authentication
-
Pittsburgh, PA, USA, July
-
A. Rabkin. Personal knowledge questions for fallback authentication. In Symp. on Usable Privacy and Se- curity (SOUPS'08), Pittsburgh, PA, USA, July 2008.
-
(2008)
Symp. on Usable Privacy and Se- curity (SOUPS'08)
-
-
Rabkin, A.1
-
18
-
-
36049038314
-
Pro- filing attacker behavior following SSH compromises
-
Edinburgh, UK, June
-
D. Ramsbrock, R. Berthier, and M. Cukier. Pro- filing attacker behavior following SSH compromises. In IEEE/IFIP Dependable Systems and Networks (DSN'07), Edinburgh, UK, June 2007.
-
(2007)
IEEE/IFIP Dependable Systems and Networks (DSN'07)
-
-
Ramsbrock, D.1
Berthier, R.2
Cukier, M.3
-
19
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Baltimore, MD, USA
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In USENIX Security Symposium, Baltimore, MD, USA, 2005.
-
(2005)
USENIX Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J. C.5
-
20
-
-
85091948348
-
The curse of the secret question
-
(Feb. 11)
-
B. Schneier. The curse of the secret question. Blog post (Feb. 11, 2005), http://www.schneier.com/ blog/archives/2005/02/the curse of th.html.
-
(2005)
Blog post
-
-
Schneier, B.1
-
22
-
-
85091915625
-
The strong password dilemma. Chapter 6 in "Authentication: From Passwords to Public Keys"
-
Addison-Wesley, Excerpt
-
R. E. Smith. The strong password dilemma. Chapter 6 in "Authentication: From Passwords to Public Keys", Addison-Wesley, 2002. Excerpt available at http://www.cryptosmith.com/sanity/ pwdilemma.html.
-
(2002)
-
-
Smith, R. E.1
-
24
-
-
0242708745
-
Pretty good persua- sion: A first step towards effective password security in the real world
-
Cloudcroft, NM, USA, Sept
-
D. Weirich and M. A. Sasse. Pretty good persua- sion: A first step towards effective password security in the real world. In New Security Paradigms Work- shop (NSPW), Cloudcroft, NM, USA, Sept. 2001.
-
(2001)
New Security Paradigms Work- shop (NSPW)
-
-
Weirich, D.1
Sasse, M. A.2
-
26
-
-
12844275960
-
Password memorability and security: Empirical re- sults
-
Sept.-Oct
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical re- sults. IEEE Security & Privacy, 2(5), Sept.-Oct. 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
27
-
-
0242708748
-
A note on proactive password checking
-
Cloud croft, NM, USA, Sept
-
J. J. Yan. A note on proactive password checking. In New Security Paradigms Workshop (NSPW), Cloud- croft, NM, USA, Sept. 2001.
-
(2001)
New Security Paradigms Workshop (NSPW)
-
-
Yan, J. J.1
-
28
-
-
0025545602
-
Cognitive passwords: The key to easy access control
-
Dec
-
M. Zviran and W. J. Haga. Cognitive passwords: The key to easy access control. Computers & Security, 9(8), Dec. 1990.
-
(1990)
Computers & Security
, vol.9
, Issue.8
-
-
Zviran, M.1
Haga, W. J.2
|