메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Correct horse battery staple: Exploring the usability of system-assigned passphrases

Author keywords

Passphrases; Password composition policies; System assigned passwords; Usability

Indexed keywords

NATURAL LANGUAGES; PASSPHRASES; RANDOM CHARACTERS; SYSTEM-ASSIGNED PASSWORDS; USABILITY; USABILITY METRICS;

EID: 84865029255     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2335356.2335366     Document Type: Conference Paper
Times cited : (98)

References (62)
  • 3
    • 84871236752 scopus 로고    scopus 로고
    • Spelling-error tolerant, order-independent pass-phrases via the damerau-levenshtein string-edit distance metric
    • G. V. Bard. Spelling-error tolerant, order-independent pass-phrases via the Damerau-Levenshtein string-edit distance metric. In Proc. ACSW, pages 117-124, 2007.
    • (2007) Proc. ACSW , pp. 117-124
    • Bard, G.V.1
  • 4
    • 84999135500 scopus 로고    scopus 로고
    • Using mechanical turk as a subject recruitment tool for experimental research
    • A. J. Berinsky, G. A. Huber, and G. S. Len. Using Mechanical Turk as a subject recruitment tool for experimental research. Political Analysis, 2011.
    • (2011) Political Analysis
    • Berinsky, A.J.1    Huber, G.A.2    Len, G.S.3
  • 5
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 6
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE Symposium on Security and Privacy, 2012.
    • (2012) Proc IEEE Symposium on Security and Privacy
    • Bonneau, J.1
  • 8
    • 84865034378 scopus 로고    scopus 로고
    • Linguistic properties of multi-word passphrases
    • J. Bonneau and E. Shutova. Linguistic properties of multi-word passphrases. In Proc. USEC, 2012.
    • (2012) Proc. USEC
    • Bonneau, J.1    Shutova, E.2
  • 9
    • 79960392344 scopus 로고    scopus 로고
    • Amazon's mechanical turk: A new source of inexpensive, yet high-quality, data?
    • M. Buhrmester, T. Kwang, and S. D. Gosling. Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data? Persp. Psych. Sci., 6(1):3-5, 2011.
    • (2011) Persp. Psych. Sci. , vol.6 , Issue.1 , pp. 3-5
    • Buhrmester, M.1    Kwang, T.2    Gosling, S.D.3
  • 11
    • 84959406256 scopus 로고    scopus 로고
    • Adaptive password-strength meters from markov models
    • C. Castelluccia, M. Durmuth, and D. Perito. Adaptive password-strength meters from Markov models. In Proc. NDSS, 2012.
    • (2012) Proc. NDSS
    • Castelluccia, C.1    Durmuth, M.2    Perito, D.3
  • 13
    • 55649124625 scopus 로고    scopus 로고
    • Kwyjibo: Automatic domain name generation
    • H. Crawford and J. Aycock. Kwyjibo: automatic domain name generation. Softw: Pract. Exper., 38(14):1561-1567, 2008.
    • (2008) Softw: Pract. Exper. , vol.38 , Issue.14 , pp. 1561-1567
    • Crawford, H.1    Aycock, J.2
  • 16
    • 77956235582 scopus 로고    scopus 로고
    • Are your participants gaming the system? Screening mechanical turk workers
    • J. S. Downs, M. B. Holbrook, S. Sheng, and L. F. Cranor. Are your participants gaming the system? Screening Mechanical Turk workers. In Proc. ACM CHI, 2010.
    • (2010) Proc. ACM CHI
    • Downs, J.S.1    Holbrook, M.B.2    Sheng, S.3    Cranor, L.F.4
  • 17
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • D. Florêncio and C. Herley. A large-scale study of web password habits. In Proc. WWW, 2007.
    • (2007) Proc. WWW
    • Florêncio, D.1    Herley, C.2
  • 19
    • 84865004421 scopus 로고
    • A random word generator for pronouncable passwords
    • The MITRE Corporation
    • M. Gasser. A random word generator for pronouncable passwords. Technical Report ESD-TR-75-97, The MITRE Corporation, 1975.
    • (1975) Technical Report ESD-TR-75-97
    • Gasser, M.1
  • 20
    • 84859800820 scopus 로고    scopus 로고
    • A research agenda acknowledging the persistence of passwords
    • C. Herley and P. Van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security and Privacy, 10(1):28-36, 2012.
    • (2012) IEEE Security and Privacy , vol.10 , Issue.1 , pp. 28-36
    • Herley, C.1    Van Oorschot, P.2
  • 23
    • 79955930037 scopus 로고    scopus 로고
    • The true cost of unusable password policies: Password use in the wild
    • P. Inglesant and M. A. Sasse. The true cost of unusable password policies: password use in the wild. In Proc. ACM CHI, 2010.
    • (2010) Proc. ACM CHI
    • Inglesant, P.1    Sasse, M.A.2
  • 24
    • 77956232955 scopus 로고    scopus 로고
    • Demographics of mechanical turk
    • New York University
    • P. G. Ipeirotis. Demographics of Mechanical Turk. Technical Report CeDER-10-01, New York University, 2010.
    • (2010) Technical Report CeDER-10-01
    • Ipeirotis, P.G.1
  • 25
    • 85007222899 scopus 로고    scopus 로고
    • Rethinking passwords to adapt to constrained keyboards
    • M. Jakobsson and R. Akavipat. Rethinking passwords to adapt to constrained keyboards. Proc. IEEE MoST, 2012.
    • (2012) Proc IEEE MoST
    • Jakobsson, M.1    Akavipat, R.2
  • 26
    • 33846318568 scopus 로고    scopus 로고
    • Have the cake and eat it too-Infusing usability into text-password based authentication systems
    • S. Jeyaraman and U. Topkara. Have the cake and eat it too-Infusing usability into text-password based authentication systems. In Proc. ACSAC, 2005.
    • (2005) Proc. ACSAC
    • Jeyaraman, S.1    Topkara, U.2
  • 28
    • 33751168960 scopus 로고    scopus 로고
    • The usability of passphrases for authentication: An empirical field study
    • DOI 10.1016/j.ijhcs.2006.08.005, PII S1071581906001236
    • M. Keith, B. Shao, and P. J. Steinbart. The usability of passphrases for authentication: An empirical field study. Int. J. Human-Comp. Studies, 65(1):17-28, 2007. (Pubitemid 44780141)
    • (2007) International Journal of Human Computer Studies , vol.65 , Issue.1 , pp. 17-28
    • Keith, M.1    Shao, B.2    Steinbart, P.J.3
  • 31
    • 67650081604 scopus 로고    scopus 로고
    • Crowdsourcing user studies with mechanical turk
    • A. Kittur, E. H. Chi, and B. Suh. Crowdsourcing user studies with Mechanical Turk. In Proc. ACM CHI, 2008.
    • (2008) Proc. ACM CHI
    • Kittur, A.1    Chi, E.H.2    Suh, B.3
  • 33
    • 35248895598 scopus 로고    scopus 로고
    • Human selection of mnemonic phrase-based passwords
    • C. Kuo, S. Romanosky, and L. F. Cranor. Human selection of mnemonic phrase-based passwords. In Proc. SOUPS, 2006.
    • (2006) Proc. SOUPS
    • Kuo, C.1    Romanosky, S.2    Cranor, L.F.3
  • 34
    • 33751176315 scopus 로고
    • Easily remembered passphrases: A better approach
    • Sept
    • S. A. Kurzban. Easily remembered passphrases: a better approach. SIGSAC Rev., 3(2-4):10-21, Sept. 1985.
    • (1985) SIGSAC Rev. , vol.3 , Issue.2-4 , pp. 10-21
    • Kurzban, S.A.1
  • 35
    • 52249115125 scopus 로고    scopus 로고
    • Passphrase with semantic noises and a proof on its higher information rate
    • K.-W. Lee and H.-T. Ewe. Passphrase with semantic noises and a proof on its higher information rate. In Proc. CISW, 2007.
    • (2007) Proc. CISW
    • Lee, K.-W.1    Ewe, H.-T.2
  • 36
    • 84865012143 scopus 로고    scopus 로고
    • A new attack on random pronounceable password generators
    • M. Leonhard and V. Venkatakrishnan. A new attack on random pronounceable password generators. In Proc. IEEE EIT, 2007.
    • (2007) Proc. IEEE EIT
    • Leonhard, M.1    Venkatakrishnan, V.2
  • 37
    • 47649109511 scopus 로고    scopus 로고
    • A comparative study of three random password generators
    • M. D. Leonhard and V. N. Venkatakrishnan. A comparative study of three random password generators. In Proc. IEEE EIT, 2007.
    • (2007) Proc. IEEE EIT
    • Leonhard, M.D.1    Venkatakrishnan, V.N.2
  • 39
    • 84865012146 scopus 로고    scopus 로고
    • Improving usability through password-corrective hashing
    • A. Mehler and S. Skiena. Improving usability through password-corrective hashing. In Proc. SPIRE, 2006.
    • (2006) Proc. SPIRE
    • Mehler, A.1    Skiena, S.2
  • 40
    • 85015024831 scopus 로고    scopus 로고
    • R. Munroe
    • R. Munroe. xkcd: Password strength. https://www.xkcd.com/936/, 2012.
    • (2012) Xkcd: Password Strength
  • 42
    • 0019895650 scopus 로고
    • A password extension for improved human factors
    • S. N. Porter. A password extension for improved human factors. Computers and Security, 1(1), 1982.
    • (1982) Computers and Security , vol.1 , Issue.1
    • Porter, S.N.1
  • 44
    • 84865034381 scopus 로고
    • A. G. Reinhold. Diceware. http://world.std.com/~reinhold/diceware.html, 1995-2011.
    • (1995)
    • Reinhold, A.G.1
  • 45
    • 39349101677 scopus 로고    scopus 로고
    • Password security: What users know and what they actually do
    • Feb
    • S. Riley. Password security: What users know and what they actually do. Usability News, 8(1), Feb. 2006.
    • (2006) Usability News , vol.8 , Issue.1
    • Riley, S.1
  • 46
    • 85071080463 scopus 로고    scopus 로고
    • Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
    • S. Schechter, C. Herley, and M. Mitzenmacher. Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks. In Proc. HotSec, 2010.
    • (2010) Proc. HotSec
    • Schechter, S.1    Herley, C.2    Mitzenmacher, M.3
  • 48
    • 84865001961 scopus 로고    scopus 로고
    • Defending privacy at the U.S. border: A guide for travelers carrying digital devices
    • S. Schoen, M. Hofmann, and R. Reynolds. Defending privacy at the U.S. border: A guide for travelers carrying digital devices. Electronic Frontier Foundation, 2011.
    • (2011) Electronic Frontier Foundation
    • Schoen, S.1    Hofmann, M.2    Reynolds, R.3
  • 50
    • 84940644968 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon
    • C. E. Shannon. A mathematical theory of communication. Bell Syst. Tech. J., 27:379-423, 1949.
    • (1949) Bell Syst. Tech. J. , vol.27 , pp. 379-423
  • 53
    • 0028406329 scopus 로고
    • Pass-sentence-a new approach to computer code
    • Apr
    • Y. Spector and J. Ginzberg. Pass-sentence-a new approach to computer code. Comput. Secur., 13(2):145-160, Apr. 1994.
    • (1994) Comput. Secur. , vol.13 , Issue.2 , pp. 145-160
    • Spector, Y.1    Ginzberg, J.2
  • 54
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton. Analysis of end user security behaviors. Comp. & Security, 24(2):124-133, 2005. (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 55
    • 84865022403 scopus 로고    scopus 로고
    • Utility of human-computer interactions: Toward a science of preference measurement
    • M. Toomim, T. Kriplean, C. Pörtner, and J. Landay. Utility of human-computer interactions: toward a science of preference measurement. In Proc. ACM CHI, 2011.
    • (2011) Proc. ACM CHI
    • Toomim, M.1    Kriplean, T.2    Pörtner, C.3    Landay, J.4
  • 57
    • 78650022232 scopus 로고    scopus 로고
    • Testing metrics for password creation policies by attacking large sets of revealed passwords
    • M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. CCS, 2010.
    • (2010) Proc. CCS
    • Weir, M.1    Aggarwal, S.2    Collins, M.3    Stern, H.4
  • 60
    • 78650011800 scopus 로고    scopus 로고
    • The security of modern password expiration: An algorithmic framework and empirical analysis
    • Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proc. CCS, 2010.
    • (2010) Proc. CCS
    • Zhang, Y.1    Monrose, F.2    Reiter, M.K.3
  • 61
    • 0003369812 scopus 로고
    • A comparison of password techniques for multilevel authentication mechanisms
    • M. Zviran and W. J. Haga. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal, 36(3):227-237, 1993.
    • (1993) The Computer Journal , vol.36 , Issue.3 , pp. 227-237
    • Zviran, M.1    Haga, W.J.2
  • 62
    • 0033277446 scopus 로고    scopus 로고
    • Password security: An empirical study
    • M. Zviran and W. J. Haga. Password security: an empirical study. J. Mgt. Info. Sys., 15(4), 199
    • J. Mgt. Info. Sys. , vol.15 , Issue.4 , pp. 199
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.