-
1
-
-
84878346963
-
-
Tech Report 817
-
J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, "The quest to replace passwords: A framework for comparative evaluation of web authentication schemes," University of Cambridge Computer Laboratory, Tech Report 817, 2012, www.cl.cam.ac.uk/techreports/UCAM-CL-TR-817.html.
-
(2012)
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Stajano, F.4
-
2
-
-
0018543411
-
Password security: A case history
-
R. Morris and K. Thompson, "Password security: a case history," Commun. ACM, vol. 22, no. 11, pp. 594-597, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
3
-
-
0043232732
-
Users Are Not The Enemy
-
A. Adams and M. Sasse, "Users Are Not The Enemy," Commun. ACM, vol. 42, no. 12, pp. 41-46, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.2
-
4
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
C. Herley and P. C. van Oorschot, "A research agenda acknowledging the persistence of passwords," IEEE Security & Privacy, vol. 10, no. 1, pp. 28-36, 2012.
-
(2012)
IEEE Security & Privacy
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.C.2
-
5
-
-
77954754833
-
One-Time Password Access to Any Server Without Changing the Server
-
D. Florêncio and C. Herley, "One-Time Password Access to Any Server Without Changing the Server," ISC 2008, Taipei.
-
ISC 2008, Taipei
-
-
Florêncio, D.1
Herley, C.2
-
6
-
-
79960801872
-
Leveraging personal devices for stronger password authentication from untrusted computers
-
M. Mannan and P. C. van Oorschot, "Leveraging personal devices for stronger password authentication from untrusted computers," Journal of Computer Security, vol. 19, no. 4, pp. 703-750, 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.4
, pp. 703-750
-
-
Mannan, M.1
Van Oorschot, P.C.2
-
7
-
-
84856260670
-
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
-
S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P. C. van Oorschot, "Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism," IEEE Trans. on Dependable and Secure Computing, vol. 9, no. 2, pp. 222-235, 2012.
-
(2012)
IEEE Trans. on Dependable and Secure Computing
, vol.9
, Issue.2
, pp. 222-235
-
-
Chiasson, S.1
Stobert, E.2
Forget, A.3
Biddle, R.4
Van Oorschot, P.C.5
-
8
-
-
84855796670
-
Pico: No more passwords!
-
Proc. Sec. Protocols Workshop 2011, ser. Springer
-
F. Stajano, "Pico: No more passwords!" in Proc. Sec. Protocols Workshop 2011, ser. LNCS, vol. 7114. Springer.
-
LNCS
, vol.7114
-
-
Stajano, F.1
-
9
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
December
-
L. O'Gorman, "Comparing passwords, tokens, and biometrics for user authentication," Proceedings of the IEEE, vol. 91, no. 12, pp. 2019-2040, December 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2019-2040
-
-
O'Gorman, L.1
-
10
-
-
33751109662
-
Quantification of authentication mechanisms: A usability perspective
-
K. Renaud, "Quantification of authentication mechanisms: a usability perspective," J. Web Eng., vol. 3, no. 2, pp. 95-123, 2004.
-
(2004)
J. Web Eng.
, vol.3
, Issue.2
, pp. 95-123
-
-
Renaud, K.1
-
11
-
-
84866496149
-
Graphical Passwords: Learning from the First Twelve Years
-
R. Biddle, S. Chiasson, and P. C. van Oorschot, "Graphical Passwords: Learning from the First Twelve Years," ACM Computing Surveys, vol. 44, no. 4, 2012.
-
(2012)
ACM Computing Surveys
, vol.44
, Issue.4
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.C.3
-
13
-
-
79958097346
-
The password thicket: Technical and market failures in human authentication on the web
-
J. Bonneau and S. Preibusch, "The password thicket: technical and market failures in human authentication on the web," in Proc. WEIS 2010, 2010.
-
Proc. WEIS 2010, 2010
-
-
Bonneau, J.1
Preibusch, S.2
-
14
-
-
84878356177
-
The science of guessing: analyzing an anonymized corpus of 70 million passwords
-
J. Bonneau, "The science of guessing: analyzing an anonymized corpus of 70 million passwords," IEEE Symp. Security and Privacy, May 2012.
-
IEEE Symp. Security and Privacy, May 2012
-
-
Bonneau, J.1
-
15
-
-
85084161244
-
Dos and don'ts of client authentication on the web
-
K. Fu, E. Sit, K. Smith, and N. Feamster, "Dos and don'ts of client authentication on the web," in Proc. USENIX Security Symposium, 2001.
-
Proc. USENIX Security Symposium, 2001
-
-
Fu, K.1
Sit, E.2
Smith, K.3
Feamster, N.4
-
17
-
-
65449175738
-
Analyzing websites for user-visible security design flaws
-
L. Falk, A. Prakash, and K. Borders, "Analyzing websites for user-visible security design flaws," in ACM SOUPS 2008, pp. 117-126.
-
ACM SOUPS 2008
, pp. 117-126
-
-
Falk, L.1
Prakash, A.2
Borders, K.3
-
20
-
-
50249139113
-
ClearShot: Eavesdropping on Keyboard Input from Video
-
D. Balzarotti, M. Cova, and G. Vigna, "ClearShot: Eavesdropping on Keyboard Input from Video," in IEEE Symp. Security and Privacy, 2008, pp. 170-183.
-
IEEE Symp. Security and Privacy, 2008
, pp. 170-183
-
-
Balzarotti, D.1
Cova, M.2
Vigna, G.3
-
22
-
-
85175131891
-
-
ver. 10.0.2
-
Mozilla Firefox, ver. 10.0.2, www.mozilla.org/.
-
-
-
-
24
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, pp. 993-999, December 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
26
-
-
63449115454
-
A Taxonomy of Single Sign-On Systems
-
Proc. ACISP 2003, Information Security and Privacy, 8th Australasian Conference. Springer
-
A. Pashalidis and C. J. Mitchell, "A Taxonomy of Single Sign-On Systems," in Proc. ACISP 2003, Information Security and Privacy, 8th Australasian Conference. Springer LNCS 2727, 2003, pp. 249-264.
-
(2003)
LNCS
, vol.2727
, pp. 249-264
-
-
Pashalidis, A.1
Mitchell, C.J.2
-
28
-
-
78751558943
-
A billion keys, but few locks: The crisis of web single sign-on
-
S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov, "A billion keys, but few locks: the crisis of web single sign-on," Proc. NSPW 2010, pp. 61-72.
-
Proc. NSPW 2010
, pp. 61-72
-
-
Sun, S.-T.1
Boshmaf, Y.2
Hawkey, K.3
Beznosov, K.4
-
30
-
-
81055155529
-
Make mine a quadruple: Strengthening the security of graphical one-time pin authentication
-
R. Jhawar, P. Inglesant, N. Courtois, and M. A. Sasse, "Make mine a quadruple: Strengthening the security of graphical one-time pin authentication," in Proc. NSS 2011, pp. 81-88.
-
Proc. NSS 2011
, pp. 81-88
-
-
Jhawar, R.1
Inglesant, P.2
Courtois, N.3
Sasse, M.A.4
-
31
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
35
-
-
84878346459
-
-
Jun. arstechnica.com/security/news/2011/06/rsa-finally
-
P. Bright, "RSA finally comes clean: SecurID is compromised," Jun. 2011, arstechnica.com/security/news/2011/06/rsa-finally-comes-clean- securid-is-compromised.ars.
-
(2011)
RSA Finally Comes Clean: SecurID Is Compromised
-
-
Bright, P.1
-
37
-
-
33744779400
-
Biometrics: A tool for information security
-
A. K. Jain, A. Ross, and S. Pankanti, "Biometrics: a tool for information security," IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125-143, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
38
-
-
33947492044
-
From template to image: Reconstructing fingerprints from minutiae points
-
DOI 10.1109/TPAMI.2007.1018, Special issue on Biometrics: Progress and Directions
-
A. Ross, J. Shah, and A. K. Jain, "From Template to Image: Reconstructing Fingerprints from Minutiae Points," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 544-560, 2007. (Pubitemid 46464396)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 544-560
-
-
Ross, A.1
Shah, J.2
Jain, A.K.3
-
39
-
-
0742290132
-
How iris recognition works
-
J. Daugman, "How iris recognition works," IEEE Trans. Circuits Syst. Video Techn., vol. 14, no. 1, pp. 21-30, 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Techn.
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
40
-
-
33947384963
-
Audio-Visual Biometrics
-
P. S. Aleksic and A. K. Katsaggelos, "Audio-Visual Biometrics," Proc. of the IEEE, vol. 94, no. 11, pp. 2025-2044, 2006.
-
(2006)
Proc. of the IEEE
, vol.94
, Issue.11
, pp. 2025-2044
-
-
Aleksic, P.S.1
Katsaggelos, A.K.2
-
41
-
-
0036030112
-
Impact of artificial "gummy" fingers on fingerprint systems
-
DOI 10.1117/12.462719
-
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of artificial "gummy" fingers on fingerprint systems," in SPIE Conf. Series, vol. 4677, Apr. 2002, pp. 275-289. (Pubitemid 35229811)
-
(2002)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4677
, pp. 275-289
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
42
-
-
85175130072
-
-
LastPass, www.lastpass.com/.
-
-
-
-
43
-
-
0033719386
-
Risks of the Passport single signon protocol
-
D. P. Kormann and A. D. Rubin, "Risks of the Passport single signon protocol," Computer Networks, vol. 33, no. 1-6, 2000.
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
-
-
Kormann, D.P.1
Rubin, A.D.2
-
44
-
-
84855245530
-
-
"Facebook Connect," 2011, www.facebook.com/advertising/? connect.
-
(2011)
Facebook Connect
-
-
-
47
-
-
38049015008
-
-
Master's thesis, School of Information Technology and Engineering, University of Ottawa, June
-
H. Tao, "Pass-Go, a New Graphical Password Scheme," Master's thesis, School of Information Technology and Engineering, University of Ottawa, June 2006.
-
(2006)
Pass-Go, a New Graphical Password Scheme
-
-
Tao, H.1
-
49
-
-
70349284581
-
Secure human identification protocols
-
N. Hopper and M. Blum, "Secure human identification protocols," ASIACRYPT 2001, pp. 52-66, 2001.
-
(2001)
ASIACRYPT 2001
, pp. 52-66
-
-
Hopper, N.1
Blum, M.2
-
50
-
-
0039068594
-
Authenticating users by word association
-
S. Smith, "Authenticating users by word association," Computers & Security, vol. 6, no. 6, pp. 464-470, 1987.
-
(1987)
Computers & Security
, vol.6
, Issue.6
, pp. 464-470
-
-
Smith, S.1
-
51
-
-
85175130951
-
Outflanking and securely using the PIN/TAN-System
-
vol. cs.CR/0410025
-
A. Wiesmaier, M. Fischer, E. G. Karatsiolis, and M. Lippert, "Outflanking and securely using the PIN/TAN-System," CoRR, vol. cs.CR/0410025, 2004.
-
(2004)
CoRR
-
-
Wiesmaier, A.1
Fischer, M.2
Karatsiolis, E.G.3
Lippert, M.4
-
52
-
-
85175131739
-
-
"PassWindow," 2011, www.passwindow.com.
-
(2011)
PassWindow
-
-
-
53
-
-
85175133524
-
-
static.yubico.com/var/uploads/YubiKey-manual-2.0.
-
Yubico, "The YubiKey Manual, v. 2.0," 2009, static.yubico.com/var/uploads/YubiKey-manual-2.0.pdf.
-
(2009)
The YubiKey Manual, V. 2.0
-
-
-
54
-
-
85175129771
-
-
Ironkey, www.ironkey.com/internet-authentication.
-
-
-
-
55
-
-
70350416988
-
Optimised to Fail: Card Readers for Online Banking
-
S. Drimer, S. J. Murdoch, and R. Anderson, "Optimised to Fail: Card Readers for Online Banking," in Financial Cryptography and Data Security, 2009, pp. 184-200.
-
(2009)
Financial Cryptography and Data Security
, pp. 184-200
-
-
Drimer, S.1
Murdoch, S.J.2
Anderson, R.3
-
56
-
-
85175132872
-
-
Cronto, www.cronto.com/.
-
-
-
-
58
-
-
70449688213
-
It's no secret: Measuring the security and reliability of authentication via 'secret' questions
-
S. Schechter, A. J. B. Brush, and S. Egelman, "It's no secret: Measuring the security and reliability of authentication via 'secret' questions," in IEEE Symp. Security and Privacy, 2009, pp. 375-390.
-
IEEE Symp. Security and Privacy, 2009
, pp. 375-390
-
-
Schechter, S.1
Brush, A.J.B.2
Egelman, S.3
-
60
-
-
34547363189
-
Fourth-factor authentication: Somebody you know
-
J. Brainard, A. Juels, R. L. Rivest, M. Szydlo, and M. Yung, "Fourth-factor authentication: somebody you know," in ACM CCS 2006, pp. 168-178.
-
ACM CCS 2006
, pp. 168-178
-
-
Brainard, J.1
Juels, A.2
Rivest, R.L.3
Szydlo, M.4
Yung, M.5
-
64
-
-
84896917008
-
On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability
-
Q. Yan, J. Han, Y. Li, and H. Deng, "On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability." Proc. NDSS, 2012.
-
Proc. NDSS, 2012
-
-
Yan, Q.1
Han, J.2
Li, Y.3
Deng, H.4
-
65
-
-
80051962268
-
Using Fingerprint Authentication to Reduce System Security: An Empirical Study
-
H. Wimberly and L. M. Liebrock, "Using Fingerprint Authentication to Reduce System Security: An Empirical Study," in IEEE Symp. Security and Privacy, 2011, pp. 32-46.
-
IEEE Symp. Security and Privacy, 2011
, pp. 32-46
-
-
Wimberly, H.1
Liebrock, L.M.2
-
66
-
-
84967321284
-
Risk and morality: Three framing devices
-
R. Ericson and A. Doyle, Eds. University of Toronto Press
-
J. Adams, "Risk and morality: three framing devices," in Risk and Morality, R. Ericson and A. Doyle, Eds. University of Toronto Press, 2003.
-
(2003)
Risk and Morality
-
-
Adams, J.1
-
67
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in ACM SPSM 2011: 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3-14.
-
ACM SPSM 2011: 1st Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
|