-
3
-
-
84871236752
-
Spelling-error tolerant, order-independent pass-phrases via the damerau-levenshtein string-edit distance metric
-
G. V. Bard. Spelling-error tolerant, order-independent pass-phrases via the Damerau-Levenshtein string-edit distance metric. In Proc. ACSW, pages 117-124, 2007.
-
(2007)
Proc. ACSW
, pp. 117-124
-
-
Bard, G.V.1
-
4
-
-
84999135500
-
Using mechanical turk as a subject recruitment tool for experimental research
-
A. J. Berinsky, G. A. Huber, and G. S. Len. Using Mechanical Turk as a subject recruitment tool for experimental research. Political Analysis, 2011.
-
(2011)
Political Analysis
-
-
Berinsky, A.J.1
Huber, G.A.2
Len, G.S.3
-
5
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
6
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE Symposium on Security and Privacy, 2012.
-
(2012)
Proc IEEE Symposium on Security and Privacy
-
-
Bonneau, J.1
-
8
-
-
84865034378
-
Linguistic properties of multi-word passphrases
-
J. Bonneau and E. Shutova. Linguistic properties of multi-word passphrases. In Proc. USEC, 2012.
-
(2012)
Proc. USEC
-
-
Bonneau, J.1
Shutova, E.2
-
9
-
-
79960392344
-
Amazon's mechanical turk: A new source of inexpensive, yet high-quality, data?
-
M. Buhrmester, T. Kwang, and S. D. Gosling. Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data? Persp. Psych. Sci., 6(1):3-5, 2011.
-
(2011)
Persp. Psych. Sci.
, vol.6
, Issue.1
, pp. 3-5
-
-
Buhrmester, M.1
Kwang, T.2
Gosling, S.D.3
-
13
-
-
55649124625
-
Kwyjibo: Automatic domain name generation
-
H. Crawford and J. Aycock. Kwyjibo: automatic domain name generation. Softw: Pract. Exper., 38(14):1561-1567, 2008.
-
(2008)
Softw: Pract. Exper.
, vol.38
, Issue.14
, pp. 1561-1567
-
-
Crawford, H.1
Aycock, J.2
-
16
-
-
77956235582
-
Are your participants gaming the system? Screening mechanical turk workers
-
J. S. Downs, M. B. Holbrook, S. Sheng, and L. F. Cranor. Are your participants gaming the system? Screening Mechanical Turk workers. In Proc. ACM CHI, 2010.
-
(2010)
Proc. ACM CHI
-
-
Downs, J.S.1
Holbrook, M.B.2
Sheng, S.3
Cranor, L.F.4
-
17
-
-
35348884906
-
A large-scale study of web password habits
-
D. Florêncio and C. Herley. A large-scale study of web password habits. In Proc. WWW, 2007.
-
(2007)
Proc. WWW
-
-
Florêncio, D.1
Herley, C.2
-
19
-
-
84865004421
-
A random word generator for pronouncable passwords
-
The MITRE Corporation
-
M. Gasser. A random word generator for pronouncable passwords. Technical Report ESD-TR-75-97, The MITRE Corporation, 1975.
-
(1975)
Technical Report ESD-TR-75-97
-
-
Gasser, M.1
-
20
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
C. Herley and P. Van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security and Privacy, 10(1):28-36, 2012.
-
(2012)
IEEE Security and Privacy
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.2
-
23
-
-
79955930037
-
The true cost of unusable password policies: Password use in the wild
-
P. Inglesant and M. A. Sasse. The true cost of unusable password policies: password use in the wild. In Proc. ACM CHI, 2010.
-
(2010)
Proc. ACM CHI
-
-
Inglesant, P.1
Sasse, M.A.2
-
24
-
-
77956232955
-
Demographics of mechanical turk
-
New York University
-
P. G. Ipeirotis. Demographics of Mechanical Turk. Technical Report CeDER-10-01, New York University, 2010.
-
(2010)
Technical Report CeDER-10-01
-
-
Ipeirotis, P.G.1
-
25
-
-
85007222899
-
Rethinking passwords to adapt to constrained keyboards
-
M. Jakobsson and R. Akavipat. Rethinking passwords to adapt to constrained keyboards. Proc. IEEE MoST, 2012.
-
(2012)
Proc IEEE MoST
-
-
Jakobsson, M.1
Akavipat, R.2
-
26
-
-
33846318568
-
Have the cake and eat it too-Infusing usability into text-password based authentication systems
-
S. Jeyaraman and U. Topkara. Have the cake and eat it too-Infusing usability into text-password based authentication systems. In Proc. ACSAC, 2005.
-
(2005)
Proc. ACSAC
-
-
Jeyaraman, S.1
Topkara, U.2
-
27
-
-
70749087044
-
A behavioral analysis of passphrase design and effectiveness
-
M. Keith, B. Shao, and P. Steinbart. A behavioral analysis of passphrase design and effectiveness. Journal of the Association for Information Systems, 10(2):63-89, 2009.
-
(2009)
Journal of the Association for Information Systems
, vol.10
, Issue.2
, pp. 63-89
-
-
Keith, M.1
Shao, B.2
Steinbart, P.3
-
28
-
-
33751168960
-
The usability of passphrases for authentication: An empirical field study
-
DOI 10.1016/j.ijhcs.2006.08.005, PII S1071581906001236
-
M. Keith, B. Shao, and P. J. Steinbart. The usability of passphrases for authentication: An empirical field study. Int. J. Human-Comp. Studies, 65(1):17-28, 2007. (Pubitemid 44780141)
-
(2007)
International Journal of Human Computer Studies
, vol.65
, Issue.1
, pp. 17-28
-
-
Keith, M.1
Shao, B.2
Steinbart, P.J.3
-
29
-
-
84865012141
-
-
Under review
-
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, and L. F. Cranor. The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs, 2012. Under review.
-
(2012)
The Impact of Length and Mathematical Operators on the Usability and Security of System-assigned One-time PINs
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
-
30
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, and J. Lopez. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proc. IEEE Symp. Security & Privacy, 2012.
-
(2012)
Proc IEEE Symp. Security & Privacy
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
31
-
-
67650081604
-
Crowdsourcing user studies with mechanical turk
-
A. Kittur, E. H. Chi, and B. Suh. Crowdsourcing user studies with Mechanical Turk. In Proc. ACM CHI, 2008.
-
(2008)
Proc. ACM CHI
-
-
Kittur, A.1
Chi, E.H.2
Suh, B.3
-
32
-
-
84874875222
-
Of passwords and people: Measuring the effect of password-composition policies
-
S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman. Of passwords and people: measuring the effect of password-composition policies. In Proc. ACM CHI, 2011.
-
(2011)
Proc. ACM CHI
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
33
-
-
35248895598
-
Human selection of mnemonic phrase-based passwords
-
C. Kuo, S. Romanosky, and L. F. Cranor. Human selection of mnemonic phrase-based passwords. In Proc. SOUPS, 2006.
-
(2006)
Proc. SOUPS
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
34
-
-
33751176315
-
Easily remembered passphrases: A better approach
-
Sept
-
S. A. Kurzban. Easily remembered passphrases: a better approach. SIGSAC Rev., 3(2-4):10-21, Sept. 1985.
-
(1985)
SIGSAC Rev.
, vol.3
, Issue.2-4
, pp. 10-21
-
-
Kurzban, S.A.1
-
35
-
-
52249115125
-
Passphrase with semantic noises and a proof on its higher information rate
-
K.-W. Lee and H.-T. Ewe. Passphrase with semantic noises and a proof on its higher information rate. In Proc. CISW, 2007.
-
(2007)
Proc. CISW
-
-
Lee, K.-W.1
Ewe, H.-T.2
-
36
-
-
84865012143
-
A new attack on random pronounceable password generators
-
M. Leonhard and V. Venkatakrishnan. A new attack on random pronounceable password generators. In Proc. IEEE EIT, 2007.
-
(2007)
Proc. IEEE EIT
-
-
Leonhard, M.1
Venkatakrishnan, V.2
-
39
-
-
84865012146
-
Improving usability through password-corrective hashing
-
A. Mehler and S. Skiena. Improving usability through password-corrective hashing. In Proc. SPIRE, 2006.
-
(2006)
Proc. SPIRE
-
-
Mehler, A.1
Skiena, S.2
-
40
-
-
85015024831
-
-
R. Munroe
-
R. Munroe. xkcd: Password strength. https://www.xkcd.com/936/, 2012.
-
(2012)
Xkcd: Password Strength
-
-
-
42
-
-
0019895650
-
A password extension for improved human factors
-
S. N. Porter. A password extension for improved human factors. Computers and Security, 1(1), 1982.
-
(1982)
Computers and Security
, vol.1
, Issue.1
-
-
Porter, S.N.1
-
43
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
R. W. Proctor, M.-C. Lien, K.-P. L. Vu, E. E. Schultz, and G. Salvendy. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Res. Methods, Instruments, & Computers, 34(2):163-169, 2002.
-
(2002)
Behavior Res. Methods, Instruments, & Computers
, vol.34
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.-C.2
Vu, K.-P.L.3
Schultz, E.E.4
Salvendy, G.5
-
44
-
-
84865034381
-
-
A. G. Reinhold. Diceware. http://world.std.com/~reinhold/diceware.html, 1995-2011.
-
(1995)
-
-
Reinhold, A.G.1
-
45
-
-
39349101677
-
Password security: What users know and what they actually do
-
Feb
-
S. Riley. Password security: What users know and what they actually do. Usability News, 8(1), Feb. 2006.
-
(2006)
Usability News
, vol.8
, Issue.1
-
-
Riley, S.1
-
46
-
-
85071080463
-
Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
-
S. Schechter, C. Herley, and M. Mitzenmacher. Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks. In Proc. HotSec, 2010.
-
(2010)
Proc. HotSec
-
-
Schechter, S.1
Herley, C.2
Mitzenmacher, M.3
-
48
-
-
84865001961
-
Defending privacy at the U.S. border: A guide for travelers carrying digital devices
-
S. Schoen, M. Hofmann, and R. Reynolds. Defending privacy at the U.S. border: A guide for travelers carrying digital devices. Electronic Frontier Foundation, 2011.
-
(2011)
Electronic Frontier Foundation
-
-
Schoen, S.1
Hofmann, M.2
Reynolds, R.3
-
50
-
-
84940644968
-
A mathematical theory of communication
-
C. E. Shannon
-
C. E. Shannon. A mathematical theory of communication. Bell Syst. Tech. J., 27:379-423, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
-
51
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
R. Shay, S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor. Encountering stronger password requirements: user attitudes and behaviors. In Proc. SOUPS, 2010.
-
(2010)
Proc. SOUPS
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
Leon, P.G.4
Mazurek, M.L.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
-
52
-
-
84865034383
-
Motivating users to choose better passwords through peer pressure
-
A. Sotirakopoulos, I. Muslukov, K. Beznosov, C. Herley, and S. Egelman. Motivating users to choose better passwords through peer pressure. SOUPS Poster, 2011.
-
(2011)
SOUPS Poster
-
-
Sotirakopoulos, A.1
Muslukov, I.2
Beznosov, K.3
Herley, C.4
Egelman, S.5
-
53
-
-
0028406329
-
Pass-sentence-a new approach to computer code
-
Apr
-
Y. Spector and J. Ginzberg. Pass-sentence-a new approach to computer code. Comput. Secur., 13(2):145-160, Apr. 1994.
-
(1994)
Comput. Secur.
, vol.13
, Issue.2
, pp. 145-160
-
-
Spector, Y.1
Ginzberg, J.2
-
54
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton. Analysis of end user security behaviors. Comp. & Security, 24(2):124-133, 2005. (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
55
-
-
84865022403
-
Utility of human-computer interactions: Toward a science of preference measurement
-
M. Toomim, T. Kriplean, C. Pörtner, and J. Landay. Utility of human-computer interactions: toward a science of preference measurement. In Proc. ACM CHI, 2011.
-
(2011)
Proc. ACM CHI
-
-
Toomim, M.1
Kriplean, T.2
Pörtner, C.3
Landay, J.4
-
56
-
-
84979173757
-
How does your password measure up? the effect of strength meters on password creation
-
To appear
-
B. Ur, P. G. Kelley, S. Komanduri, J. Lee, M. Maass, M. Mazurek, T. Passaro, R. Shay, T. Vidas, L. Bauer, N. Christin, and L. F. Cranor. How does your password measure up? The effect of strength meters on password creation. In Proc. USENIX Security, 2012. To appear.
-
(2012)
Proc. USENIX Security
-
-
Ur, B.1
Kelley, P.G.2
Komanduri, S.3
Lee, J.4
Maass, M.5
Mazurek, M.6
Passaro, T.7
Shay, R.8
Vidas, T.9
Bauer, L.10
Christin, N.11
Cranor, L.F.12
-
57
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. CCS, 2010.
-
(2010)
Proc. CCS
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
59
-
-
12844275960
-
Password memorability and security: Empirical results
-
Sept
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results. IEEE Security and Privacy, 2(5), Sept. 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
60
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proc. CCS, 2010.
-
(2010)
Proc. CCS
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
-
61
-
-
0003369812
-
A comparison of password techniques for multilevel authentication mechanisms
-
M. Zviran and W. J. Haga. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal, 36(3):227-237, 1993.
-
(1993)
The Computer Journal
, vol.36
, Issue.3
, pp. 227-237
-
-
Zviran, M.1
Haga, W.J.2
-
62
-
-
0033277446
-
Password security: An empirical study
-
M. Zviran and W. J. Haga. Password security: an empirical study. J. Mgt. Info. Sys., 15(4), 199
-
J. Mgt. Info. Sys.
, vol.15
, Issue.4
, pp. 199
-
-
Zviran, M.1
Haga, W.J.2
|