메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Digital Objects as Passwords

Author keywords

[No Author keywords available]

Indexed keywords

ENTROPY;

EID: 84865024945     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (28)
  • 3
  • 6
    • 15744372544 scopus 로고    scopus 로고
    • Authenticating ourselves: will we ever es- cape the password?
    • S. Furnell. Authenticating ourselves: will we ever es- cape the password? Network Security, 2005(3).
    • (2005) Network Security , Issue.3
    • Furnell, S.1
  • 11
    • 85091954795 scopus 로고    scopus 로고
    • MacDevCenter.com. (Feb. 22)
    • MacDevCenter.com. How Paris got hacked? News article (Feb. 22, 2005), http://www.macdevcenter. com/pub/a/mac/2005/01/01/paris.html.
    • (2005) How Paris got hacked? News article
  • 13
    • 84869109009 scopus 로고    scopus 로고
    • Microsoft. Online article (Mar. 22)
    • Microsoft. Strong passwords: How to create and use them. Online article (Mar. 22, 2006). http://www.microsoft.com/protect/yourself/ password/create.mspx.
    • (2006) Strong passwords: How to create and use them
  • 16
    • 84901922498 scopus 로고    scopus 로고
    • Monitoring corporate password sharing using social network analysis
    • St. Pete Beach, Florida, USA, Jan
    • A. S. Patrick. Monitoring corporate password sharing using social network analysis. In International Sunbelt Social Network Conference, St. Pete Beach, Florida, USA, Jan. 2008.
    • (2008) International Sunbelt Social Network Conference
    • Patrick, A. S.1
  • 17
    • 65449137148 scopus 로고    scopus 로고
    • Personal knowledge questions for fallback authentication
    • Pittsburgh, PA, USA, July
    • A. Rabkin. Personal knowledge questions for fallback authentication. In Symp. on Usable Privacy and Se- curity (SOUPS'08), Pittsburgh, PA, USA, July 2008.
    • (2008) Symp. on Usable Privacy and Se- curity (SOUPS'08)
    • Rabkin, A.1
  • 20
    • 85091948348 scopus 로고    scopus 로고
    • The curse of the secret question
    • (Feb. 11)
    • B. Schneier. The curse of the secret question. Blog post (Feb. 11, 2005), http://www.schneier.com/ blog/archives/2005/02/the curse of th.html.
    • (2005) Blog post
    • Schneier, B.1
  • 22
    • 85091915625 scopus 로고    scopus 로고
    • The strong password dilemma. Chapter 6 in "Authentication: From Passwords to Public Keys"
    • Addison-Wesley, Excerpt
    • R. E. Smith. The strong password dilemma. Chapter 6 in "Authentication: From Passwords to Public Keys", Addison-Wesley, 2002. Excerpt available at http://www.cryptosmith.com/sanity/ pwdilemma.html.
    • (2002)
    • Smith, R. E.1
  • 24
    • 0242708745 scopus 로고    scopus 로고
    • Pretty good persua- sion: A first step towards effective password security in the real world
    • Cloudcroft, NM, USA, Sept
    • D. Weirich and M. A. Sasse. Pretty good persua- sion: A first step towards effective password security in the real world. In New Security Paradigms Work- shop (NSPW), Cloudcroft, NM, USA, Sept. 2001.
    • (2001) New Security Paradigms Work- shop (NSPW)
    • Weirich, D.1    Sasse, M. A.2
  • 25
  • 26
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical re- sults
    • Sept.-Oct
    • J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical re- sults. IEEE Security & Privacy, 2(5), Sept.-Oct. 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4
  • 27
    • 0242708748 scopus 로고    scopus 로고
    • A note on proactive password checking
    • Cloud croft, NM, USA, Sept
    • J. J. Yan. A note on proactive password checking. In New Security Paradigms Workshop (NSPW), Cloud- croft, NM, USA, Sept. 2001.
    • (2001) New Security Paradigms Workshop (NSPW)
    • Yan, J. J.1
  • 28
    • 0025545602 scopus 로고
    • Cognitive passwords: The key to easy access control
    • Dec
    • M. Zviran and W. J. Haga. Cognitive passwords: The key to easy access control. Computers & Security, 9(8), Dec. 1990.
    • (1990) Computers & Security , vol.9 , Issue.8
    • Zviran, M.1    Haga, W. J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.