-
1
-
-
84871593119
-
Memorability of persuasive passwords
-
ACM
-
R. Biddle. Memorability of Persuasive Passwords. In CHI '08 extended abstracts. ACM, 2008.
-
(2008)
CHI '08 Extended Abstracts
-
-
Biddle, R.1
-
2
-
-
80051718604
-
User study, analysis, and usable security of passwords based on digital objects
-
R. Biddle, M. Mannan, P. C. van Oorschot, and T. Whalen. User Study, Analysis, and Usable Security of Passwords Based on Digital Objects. IEEE Trans. Info. Forensics and Security, 6(3):970-979, 2011.
-
(2011)
IEEE Trans. Info. Forensics and Security
, vol.6
, Issue.3
, pp. 970-979
-
-
Biddle, R.1
Mannan, M.2
Van Oorschot, P.C.3
Whalen, T.4
-
3
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
-
IEEE
-
J. Bonneau, C. Herley, P. C. V. Oorschot, and F. Stajano. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In Symp. on Security and Privacy. IEEE, 2012.
-
(2012)
Symp. on Security and Privacy
-
-
Bonneau, J.1
Herley, C.2
Oorschot, P.C.V.3
Stajano, F.4
-
4
-
-
77956251589
-
The password thicket: Technical and market failures in human authentication on the web
-
J. Bonneau and S. Preibusch. The password thicket: technical and market failures in human authentication on the web. In WEIS'10, 2010.
-
(2010)
WEIS'10
-
-
Bonneau, J.1
Preibusch, S.2
-
5
-
-
81055156896
-
A closer look at recognition-based graphical passwords on mobile devices
-
ACM
-
P. Dunphy, A. P. Heiner, and N. Asokan. A closer look at recognition-based graphical passwords on mobile devices. In SOUPS '10. ACM, 2010.
-
(2010)
SOUPS '10
-
-
Dunphy, P.1
Heiner, A.P.2
Asokan, N.3
-
6
-
-
35348884906
-
A large-scale study of web password habits
-
ACM
-
D. Florencio and C. Herley. A large-scale study of web password habits. In WWW'07. ACM, 2007.
-
(2007)
WWW'07
-
-
Florencio, D.1
Herley, C.2
-
8
-
-
79955930037
-
The true cost of unusable password policies
-
ACM
-
P. G. Inglesant and M. A. Sasse. The true cost of unusable password policies. In CHI '10. ACM, 2010.
-
(2010)
CHI '10
-
-
Inglesant, P.G.1
Sasse, M.A.2
-
9
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In USENIX Security Symp., 1999.
-
(1999)
USENIX Security Symp.
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
11
-
-
33751168960
-
The usability of passphrases for authentication: An empirical field study
-
M. Keith, B. Shao, and P. Steinbart. The usability of passphrases for authentication: An empirical field study. Int. J. Hum.-Comp. Studies, 65(1), 2007.
-
(2007)
Int. J. Hum.-Comp. Studies
, vol.65
, Issue.1
-
-
Keith, M.1
Shao, B.2
Steinbart, P.3
-
12
-
-
78650087769
-
Multi-touch authentication on tabletops
-
ACM
-
D. Kim, P. Dunphy, P. Briggs, J. Hook, J. Nicholson, J. Nicholson, and P. Olivier. Multi-touch authentication on tabletops. In CHI '10. ACM, 2010.
-
(2010)
CHI '10
-
-
Kim, D.1
Dunphy, P.2
Briggs, P.3
Hook, J.4
Nicholson, J.5
Nicholson, J.6
Olivier, P.7
-
13
-
-
84874875222
-
Of passwords and people: Measuring the effect of password-composition policies
-
ACM
-
S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman. Of passwords and people: measuring the effect of password-composition policies. In CHI '11. ACM, 2011.
-
(2011)
CHI '11
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
14
-
-
57049127829
-
Reducing shoulder-surfing by using gaze-based password entry
-
ACM
-
M. Kumar, T. Garfinkel, D. Boneh, and T. Winograd. Reducing Shoulder-surfing by Using Gaze-based Password Entry. In SOUPS'07. ACM, 2007.
-
(2007)
SOUPS'07
-
-
Kumar, M.1
Garfinkel, T.2
Boneh, D.3
Winograd, T.4
-
15
-
-
35248895598
-
Human selection of mnemonic phrase-based passwords
-
ACM
-
C. Kuo, S. Romanosky, and L. F. Cranor. Human selection of mnemonic phrase-based passwords. In SOUPS '06. ACM, 2006.
-
(2006)
SOUPS '06
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
16
-
-
84867699001
-
The performance of touch screen soft buttons
-
ACM Press
-
S. C. Lee and S. Zhai. The Performance of Touch Screen Soft Buttons. In CHI '09. ACM Press, 2009.
-
(2009)
CHI '09
-
-
Lee, S.C.1
Zhai, S.2
-
17
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
V. I. Levenshtein. Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady, 10(8):707-710, 1966.
-
(1966)
Soviet Physics Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.I.1
-
18
-
-
14544269130
-
IBM computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use
-
J. R. Lewis. IBM Computer Usability Satisfaction Questionnaires: Psychometric Evaluation and Instructions for Use. Intl. J. Hum.-Comp. Int., 7(1), 1995.
-
(1995)
Intl. J. Hum.-Comp. Int.
, vol.7
, Issue.1
-
-
Lewis, J.R.1
-
19
-
-
0036042675
-
Psychometric evaluation of the PSSUQ using data from five years of usability studies
-
J. R. Lewis. Psychometric evaluation of the PSSUQ using data from five years of usability studies. Intl. J. Hum.-Comp. Int., 14(3), 2002.
-
(2002)
Intl. J. Hum.-Comp. Int.
, vol.14
, Issue.3
-
-
Lewis, J.R.1
-
21
-
-
65449185893
-
Touch Key Design for Target Selection on a Mobile Phone
-
ACM
-
Y. S. Park, S. H. Han, J. Park, and Y. Cho. Touch Key Design for Target Selection on a Mobile Phone. In MobileHCI '08. ACM, 2008.
-
(2008)
MobileHCI '08
-
-
Park, Y.S.1
Han, S.H.2
Park, J.3
Cho, Y.4
-
22
-
-
14844314151
-
A PIN-entry method resilient against shoulder surfing
-
ACM
-
V. Roth, K. Richter, and R. Freidinger. A PIN-entry method resilient against shoulder surfing. In CCS'04. ACM, 2004.
-
(2004)
CCS'04
-
-
Roth, V.1
Richter, K.2
Freidinger, R.3
-
23
-
-
84871605909
-
Undercover: Authentication usable in front of prying eyes
-
ACM
-
H. Sasamoto, N. Christin, and E. Hayashi. Undercover: authentication usable in front of prying eyes. In CHI '08. ACM, 2008.
-
(2008)
CHI '08
-
-
Sasamoto, H.1
Christin, N.2
Hayashi, E.3
-
24
-
-
57049144993
-
Spy-resistant keyboard: More secure password entry on public touch screen displays
-
D. S. Tan, P. Keyani, and M. Czerwinski. Spy-resistant keyboard: more secure password entry on public touch screen displays. In OZCHI '05, 2005.
-
(2005)
OZCHI '05
-
-
Tan, D.S.1
Keyani, P.2
Czerwinski, M.3
-
25
-
-
63349112674
-
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
-
ACM
-
F. Tari, A. A. Ozok, and S. H. Holden. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In SOUPS'06. ACM, 2006.
-
(2006)
SOUPS'06
-
-
Tari, F.1
Ozok, A.A.2
Holden, S.H.3
-
26
-
-
12844275960
-
Password memorability and security: Empirical results
-
IEEE
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results. Security & Privacy, IEEE, 2(5):25-31, 2004.
-
(2004)
Security & Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
27
-
-
84855691831
-
Shoulder surfing defence for recall-based graphical passwords
-
ACM
-
N. H. Zakaria, D. Griffths, S. Brostoff, and J. Yan. Shoulder surfing defence for recall-based graphical passwords. In SOUPS'11. ACM, 2011.
-
(2011)
SOUPS'11
-
-
Zakaria, N.H.1
Griffths, D.2
Brostoff, S.3
Yan, J.4
-
28
-
-
35248826508
-
S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme
-
IEEE
-
H. Zhao and X. Li. S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. In AINAW'07 Workshops. IEEE, 2007.
-
(2007)
AINAW'07 Workshops
-
-
Zhao, H.1
Li, X.2
|