-
2
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE S&P, 2012.
-
(2012)
Proc. IEEE S&P
-
-
Bonneau, J.1
-
3
-
-
84869383605
-
Operating system framed in case of mistaken identity: Measuring the success of web-based spoofing attacks on os password-entry dialogs
-
C. Bravo-Lillo, L. Cranor, J. Downs, S. Komanduri, S. Schechter, and M. Sleeper. Operating System Framed in Case of Mistaken Identity: Measuring The Success of Web-based Spoofing Attacks on OS Password-entry Dialogs. In Proc. ACM CCS, 2012.
-
(2012)
Proc. ACM CCS
-
-
Bravo-Lillo, C.1
Cranor, L.2
Downs, J.3
Komanduri, S.4
Schechter, S.5
Sleeper, M.6
-
4
-
-
79960392344
-
Amazon's mechanical turk: A new source of inexpensive, yet high-quality, data?
-
Feb
-
M. Buhrmester, T. Kwang, and S. D. Gosling. Amazon's Mechanical Turk: A New Source of Inexpensive, Yet High-Quality, Data? Perspectives on Psychological Science, 6(1):3-5, Feb. 2011.
-
(2011)
Perspectives on Psychological Science
, vol.6
, Issue.1
, pp. 3-5
-
-
Buhrmester, M.1
Kwang, T.2
Gosling, S.D.3
-
5
-
-
60349118061
-
A second look at the usability of click-based graphical passwords
-
ACM, July
-
S. Chiasson, R. Biddle, and P. C. Van Oorschot. A second look at the usability of click-based graphical passwords. In Proc. SOUPS. ACM, July 2007.
-
(2007)
Proc. SOUPS
-
-
Chiasson, S.1
Biddle, R.2
Van Oorschot, P.C.3
-
7
-
-
35248846782
-
Password management strategies for online accounts
-
ACM
-
S. Gaw and E. W. Felten. Password management strategies for online accounts. In Proc. SOUPS. ACM, 2006.
-
(2006)
Proc. SOUPS
-
-
Gaw, S.1
Felten, E.W.2
-
8
-
-
84874906715
-
A study of user password strategy for multiple accounts
-
ACM
-
S. M. T. Haque, M. Wright, and S. Scielzo. A study of user password strategy for multiple accounts. In Proc. CODASPY. ACM, 2013.
-
(2013)
Proc. CODASPY
-
-
Haque, S.M.T.1
Wright, M.2
Scielzo, S.3
-
10
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, and J. Lopez. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proc. IEEE S&P, pages 523-537, 2012.
-
(2012)
Proc. IEEE S&P
, pp. 523-537
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
11
-
-
84874875222
-
Of passwords and people: Measuring the effect of password-composition policies
-
S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman. Of passwords and people: measuring the effect of password-composition policies. In Proc. CHI. ACM, 2011.
-
(2011)
Proc. CHI. ACM
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
12
-
-
34548786769
-
The emperor's new security indicators
-
Washington, DC, USA, IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP '07, pages 51-65, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP '07
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
13
-
-
84865029255
-
Correct horse battery staple: Exploring the usability of system-assigned passphrases
-
R. Shay, P. G. Kelley, S. Komanduri, M. L. Mazurek, B. Ur, T. Vidas, L. Bauer, N. Christin, and L. F. Cranor. Correct horse battery staple: Exploring the usability of system-assigned passphrases. In Proc. SOUPS, page 7, 2012.
-
(2012)
Proc. SOUPS
, pp. 7
-
-
Shay, R.1
Kelley, P.G.2
Komanduri, S.3
Mazurek, M.L.4
Ur, B.5
Vidas, T.6
Bauer, L.7
Christin, N.8
Cranor, L.F.9
-
14
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
R. Shay, S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor. Encountering stronger password requirements: user attitudes and behaviors. In Proc. SOUPS, volume 10, 2010.
-
(2010)
Proc. SOUPS
, vol.10
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
Leon, P.G.4
Mazurek, M.L.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
-
15
-
-
84979173757
-
How does your password measure up? The effect of strength meters on password creation
-
B. Ur, P. G. Kelley, S. Komanduri, J. Lee, M. Maass, M. Mazurek, T. Passaro, R. Shay, T. Vidas, and L. Bauer. How does your password measure up? The effect of strength meters on password creation. In Proc. USENIX, 2012.
-
(2012)
Proc. USENIX
-
-
Ur, B.1
Kelley, P.G.2
Komanduri, S.3
Lee, J.4
Maass, M.5
Mazurek, M.6
Passaro, T.7
Shay, R.8
Vidas, T.9
Bauer, L.10
-
16
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. ACM CCS, pages 162-175, 2010.
-
(2010)
Proc. ACM CCS
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
17
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek. Password Cracking Using Probabilistic Context-Free Grammars. In Proc. IEEE S&P, pages 391-405, 2009.
-
(2009)
Proc. IEEE S&P
, pp. 391-405
-
-
Weir, M.1
Aggarwal, S.2
Medeiros, B.D.3
Glodek, B.4
-
18
-
-
84855691831
-
Shoulder surfing defence for recall-based graphical passwords
-
N. H. Zakaria, D. Griffths, S. Brostoff, and J. Yan. Shoulder surfing defence for recall-based graphical passwords. In Proc. SOUPS, page 6, 2011.
-
(2011)
Proc. SOUPS
, pp. 6
-
-
Zakaria, N.H.1
Griffths, D.2
Brostoff, S.3
Yan, J.4
|