-
1
-
-
84892383316
-
-
retrieved October 22
-
Amazon ec2 pricing, http://aws.amazon.com/ec2/pricing/ (retrieved October 22, 2012)
-
(2012)
-
-
-
3
-
-
84892403439
-
-
July (retrieved September 27, 2012)
-
Geek to live: Choose (and remember) great passwords (July 2006), http://lifehacker.com/184773/geek-to-live-choose-and-remember-great-passwords (retrieved September 27, 2012)
-
(2006)
Geek to Live: Choose (And Remember) Great Passwords
-
-
-
4
-
-
84919487087
-
-
December (retrieved September 27, 2012)
-
Rockyou hack: From bad to worse (December 2009), http://techcrunch.com/ 2009/12/14/rockyou-hack-security-myspace-facebook-passwords/ (retrieved September 27, 2012)
-
(2009)
Rockyou Hack: From Bad to Worse
-
-
-
5
-
-
84892382024
-
-
April (retrieved August 18, 2011)
-
Oh man, what a day! an update on our security breach (April 2010), http://blogs.atlassian.com/news/2010/04/oh-man-what-a-day-an-update-on-our- security-breach.html (retrieved August 18, 2011)
-
(2010)
Oh Man, What a Day! An Update on Our Security Breach
-
-
-
6
-
-
84892416879
-
-
May (retrieved September 9, 2012)
-
Sarah palin vs the hacker (May 2010), http://www.telegraph.co.uk/news/ worldnews/sarah-palin/7750050/Sarah-Palin-vs-the-hacker.html (retrieved September 9, 2012)
-
(2010)
Sarah Palin Vs the Hacker
-
-
-
7
-
-
84892425709
-
-
June (retrieved August 16, 2011)
-
Nato site hacked (June 2011), http://www.theregister.co.uk/2011/06/24/ nato-hack-attack/ (retrieved August 16, 2011)
-
(2011)
Nato Site Hacked
-
-
-
8
-
-
84888996876
-
-
April (retrieved May 22, 2012)
-
Update on playstation network/qriocity services (April 2011), http://blog.us.playstation.com/2011/04/22/update-on-playstation-network- qriocity-services/ (retrieved May 22, 2012)
-
(2011)
Update on Playstation Network/qriocity Services
-
-
-
11
-
-
84889000718
-
-
June (retrieved September 27, 2012)
-
An update on linkedin member passwords compromised (June 2012), http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/ (retrieved September 27, 2012)
-
(2012)
An Update on Linkedin Member Passwords Compromised
-
-
-
12
-
-
84889074898
-
-
January (retrieved May 22, 2012)
-
Zappos customer accounts breached (January 2012), http://www.usatoday. com/tech/news/story/2012-01-16/mark-smith-zappos-breach-tips/52593484/1 (retrieved May 22, 2012)
-
(2012)
Zappos Customer Accounts Breached
-
-
-
13
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
-
Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36-58. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4258
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
14
-
-
0031368613
-
Act-r: A theory of higher level cognition and its relation to visual attention
-
Anderson, J., Matessa, M., Lebiere, C.: Act-r: A theory of higher level cognition and its relation to visual attention. Human-Computer Interaction 12(4), 439-462 (1997)
-
(1997)
Human-Computer Interaction
, vol.12
, Issue.4
, pp. 439-462
-
-
Anderson, J.1
Matessa, M.2
Lebiere, C.3
-
15
-
-
84970188424
-
Reflections of the environment in memory
-
Anderson, J.R., Schooler, L.J.: Reflections of the environment in memory. Psychological Science 2(6), 396-408 (1991)
-
(1991)
Psychological Science
, vol.2
, Issue.6
, pp. 396-408
-
-
Anderson, J.R.1
Schooler, L.J.2
-
17
-
-
0003945622
-
Human memory: Theory and practice
-
Baddeley, A.: Human memory: Theory and practice. Psychology Pr. (1997)
-
(1997)
Psychology Pr.
-
-
Baddeley, A.1
-
18
-
-
84947906522
-
The exact security of digital signatures - how to sign with RSA and rabin
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399-416. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
19
-
-
84866496149
-
Graphical passwords: Learning from the first twelve years
-
Biddle, R., Chiasson, S., Van Oorschot, P.: Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR) 44(4), 19 (2012)
-
(2012)
ACM Computing Surveys (CSUR)
, vol.44
, Issue.4
, pp. 19
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.3
-
21
-
-
84892407226
-
Naturally rehearsing passwords
-
abs/1302.5122
-
Blocki, J., Blum, M., Datta, A.: Naturally rehearsing passwords. CoRR abs/1302.5122 (2013)
-
(2013)
CoRR
-
-
Blocki, J.1
Blum, M.2
Datta, A.3
-
22
-
-
84879744067
-
-
Blocki, J., Komanduri, S., Procaccia, A., Sheffet, O.: Optimizing password composition policies
-
Optimizing Password Composition Policies
-
-
Blocki, J.1
Komanduri, S.2
Procaccia, A.3
Sheffet, O.4
-
23
-
-
84893328361
-
Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks
-
USENIX Association
-
Bojinov, H., Sanchez, D., Reber, P., Boneh, D., Lincoln, P.: Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks. In: Proceedings of the 21st USENIX Conference on Security Symposium, pp. 33-33. USENIX Association (2012)
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
, pp. 33-33
-
-
Bojinov, H.1
Sanchez, D.2
Reber, P.3
Boneh, D.4
Lincoln, P.5
-
24
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
IEEE
-
Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 538-552. IEEE (2012)
-
(2012)
2012 IEEE Symposium on Security and Privacy (SP)
, pp. 538-552
-
-
Bonneau, J.1
-
25
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
-
IEEE
-
Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on Security and Privacy, pp. 553-567. IEEE (2012)
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 553-567
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Stajano, F.4
-
26
-
-
77955315457
-
-
Department of Mathematics, Royal Melbourne Institute of Technology, Tech. Rep 6
-
Boztas, S.: Entropies, guessing, and cryptography. Department of Mathematics, Royal Melbourne Institute of Technology, Tech. Rep 6 (1999)
-
(1999)
Entropies, Guessing, and Cryptography
-
-
Boztas, S.1
-
27
-
-
84892417752
-
-
Department of defense password management guideline
-
Brand, S. Department of defense password management guideline
-
-
-
Brand, S.1
-
30
-
-
84892385232
-
Consumer password worst practices
-
Center, I.: Consumer password worst practices. Imperva (White Paper) (2010)
-
(2010)
Imperva (White Paper)
-
-
Center, I.1
-
31
-
-
84878196051
-
You had me at hello: How phrasing affects memorability
-
Association for Computational Linguistics
-
Danescu-Niculescu-Mizil, C., Cheng, J., Kleinberg, J., Lee, L.: You had me at hello: How phrasing affects memorability. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Long Papers, vol. 1, pp. 892-901. Association for Computational Linguistics (2012)
-
(2012)
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Long Papers
, vol.1
, pp. 892-901
-
-
Danescu-Niculescu-Mizil, C.1
Cheng, J.2
Kleinberg, J.3
Lee, L.4
-
35
-
-
34250729756
-
Password management strategies for online accounts
-
ACM, New York
-
Gaw, S., Felten, E.W.: Password management strategies for online accounts. In: Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006, pp. 44-55. ACM, New York (2006)
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
, pp. 44-55
-
-
Gaw, S.1
Felten, E.W.2
-
36
-
-
70349284581
-
Secure human identification protocols
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
38
-
-
79958161706
-
Of passwords and people: Measuring the effect of password-composition policies
-
ACM
-
Komanduri, S., Shay, R., Kelley, P., Mazurek, M., Bauer, L., Christin, N., Cranor, L., Egelman, S.: Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems, pp. 2595-2604. ACM (2011)
-
(2011)
Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems
, pp. 2595-2604
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.3
Mazurek, M.4
Bauer, L.5
Christin, N.6
Cranor, L.7
Egelman, S.8
-
39
-
-
80053471048
-
An empirical assessment of factors impeding effective password management
-
Kruger, H., Steyn, T., Medlin, B., Drevin, L.: An empirical assessment of factors impeding effective password management. Journal of Information Privacy and Security 4(4), 45-59 (2008)
-
(2008)
Journal of Information Privacy and Security
, vol.4
, Issue.4
, pp. 45-59
-
-
Kruger, H.1
Steyn, T.2
Medlin, B.3
Drevin, L.4
-
40
-
-
0015083717
-
Simple memory: A theory for archicortex
-
Philosophical Transactions of the Royal Society of London
-
Marr, D.: Simple memory: a theory for archicortex. Philosophical Transactions of the Royal Society of London. Series B, Biological Sciences, 23-81 (1971)
-
(1971)
Series B, Biological Sciences
, pp. 23-81
-
-
Marr, D.1
-
42
-
-
84892425091
-
-
(retrieved August 16, 2011)
-
Monroe, R.: Xkcd: Password strength, http://www.xkcd.com/936/ (retrieved August 16, 2011)
-
Password Strength
-
-
Monroe, R.X.1
-
44
-
-
84947756322
-
On the incomparability of entropy and marginal guesswork in bruteforce attacks
-
Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. Springer, Heidelberg
-
Pliam, J.O.: On the incomparability of entropy and marginal guesswork in bruteforce attacks. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 67-79. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1977
, pp. 67-79
-
-
Pliam, J.O.1
-
46
-
-
84871215464
-
Towards a secure human-andcomputer mutual authentication protocol
-
Australian Computer Society Inc.
-
Radke, K., Boyd, C., Nieto, J.G., Brereton, M.: Towards a secure human-andcomputer mutual authentication protocol. In: Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), vol. 125, pp. 39-46. Australian Computer Society Inc. (2012)
-
(2012)
Proceedings of the Tenth Australasian Information Security Conference (AISC 2012)
, vol.125
, pp. 39-46
-
-
Radke, K.1
Boyd, C.2
Nieto, J.G.3
Brereton, M.4
-
47
-
-
84892424156
-
The poisson process as a model for a diversity of behavioral phenomena
-
Rasch, G.: The poisson process as a model for a diversity of behavioral phenomena. In: International Congress of Psychology (1963)
-
(1963)
International Congress of Psychology
-
-
Rasch, G.1
-
49
-
-
70449688213
-
It's no secret. Measuring the security and reliability of authentication via 'secret' questions
-
IEEE
-
Schechter, S., Brush, A., Egelman, S.: It's no secret. measuring the security and reliability of authentication via 'secret' questions. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 375-390. IEEE (2009)
-
(2009)
2009 30th IEEE Symposium on Security and Privacy
, pp. 375-390
-
-
Schechter, S.1
Brush, A.2
Egelman, S.3
-
50
-
-
84865029255
-
Correct horse battery staple: Exploring the usability of system-assigned passphrases
-
ACM
-
Shay, R., Kelley, P., Komanduri, S., Mazurek, M., Ur, B., Vidas, T., Bauer, L., Christin, N., Cranor, L.: Correct horse battery staple: Exploring the usability of system-assigned passphrases. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 7. ACM (2012)
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security
, pp. 7
-
-
Shay, R.1
Kelley, P.2
Komanduri, S.3
Mazurek, M.4
Ur, B.5
Vidas, T.6
Bauer, L.7
Christin, N.8
Cranor, L.9
-
51
-
-
84889020294
-
No plaintext passwords
-
November (retrieved August 16, 2011)
-
Singer, A.: No plaintext passwords. The Magazine of Usenix & Sage 26(7) (November 2001) (retrieved August 16, 2011)
-
(2001)
The Magazine of Usenix & Sage
, vol.26
, Issue.7
-
-
Singer, A.1
-
52
-
-
84892428234
-
The memory palace of Matteo Ricci
-
Spence, J.: The memory palace of Matteo Ricci. Penguin Books (1985)
-
(1985)
Penguin Books
-
-
Spence, J.1
-
53
-
-
0024639291
-
On the course of forgetting in very long-term memory
-
Squire, L.: On the course of forgetting in very long-term memory. Journal of Experimental Psychology: Learning, Memory, and Cognition 15(2), 241 (1989)
-
(1989)
Journal of Experimental Psychology: Learning, Memory, and Cognition
, vol.15
, Issue.2
, pp. 241
-
-
Squire, L.1
-
55
-
-
84892425440
-
Pimp my password
-
August 29
-
Stein, J.: Pimp my password. Time, 62 (August 29, 2011)
-
(2011)
Time
, pp. 62
-
-
Stein, J.1
-
56
-
-
13844317780
-
Memorization and association on a realistic neural model
-
Valiant, L.: Memorization and association on a realistic neural model. Neural Computation 17(3), 527-555 (2005)
-
(2005)
Neural Computation
, vol.17
, Issue.3
, pp. 527-555
-
-
Valiant, L.1
-
58
-
-
35248831179
-
Captcha: Using hard ai problems for security
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Von Ahn, L., Blum, M., Hopper, N., Langford, J.: Captcha: Using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 646-646. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 646-646
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
59
-
-
0025716048
-
An assessment of marr's theory of the hippocampus as a temporary memory store
-
Philosophical Transactions of the Royal Society of London
-
Willshaw, D., Buckingham, J.: An assessment of marr's theory of the hippocampus as a temporary memory store. Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences 329(1253), 205 (1990)
-
(1990)
Series B: Biological Sciences
, vol.329
, Issue.1253
, pp. 205
-
-
Willshaw, D.1
Buckingham, J.2
-
61
-
-
12844275960
-
Password memorability and security: Empirical results
-
Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Security & Privacy 2(5), 25-31 (2004)
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|