-
2
-
-
84866496149
-
Graphical passwords: Learning from the first twelve years
-
Biddle, R., Chiasson, S., and van Oorschot, P. C. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys 44, 4 (2012), 19
-
(2012)
ACM Computing Surveys
, vol.44
, Issue.4
, pp. 19
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.C.3
-
3
-
-
0029238493
-
Improving system security via proactive password checking
-
Bishop, M., and Klein, D. V. Improving system security via proactive password checking. Computers & Security 14, 3 (1995), 233-249
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
5
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
Bonneau, J. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE SP (2012)
-
(2012)
Proc. IEEE SP
-
-
Bonneau, J.1
-
6
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes
-
Bonneau, J., Herley, C., van Oorschot, P. C., and Stajano, F. The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes. In Proc. IEEE SP (2012)
-
(2012)
Proc. IEEE SP
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Stajano, F.4
-
8
-
-
84855714294
-
Anonymous speaks: The inside story of the HBGary hack
-
February
-
Bright, P. Anonymous speaks: The inside story of the HBGary hack. Ars Technica, February 2011
-
(2011)
Ars Technica
-
-
Bright, P.1
-
9
-
-
27544477471
-
-
Tech. rep., NIST
-
Burr, W. E., Dodson, D. F., Newton, E. M., Perlner, R. A., Polk, W. T., Gupta, S., and Nabbus, E. A. Electronic authentication guideline. Tech. rep., NIST, 2011
-
(2011)
Electronic Authentication Guideline
-
-
Burr, W.E.1
Dodson, D.F.2
Newton, E.M.3
Perlner, R.A.4
Polk, W.T.5
Gupta, S.6
Nabbus, E.A.7
-
10
-
-
27544477471
-
-
Tech. rep., NIST
-
Burr, W. E., Dodson, D. F., and Polk, W. T. Electronic authentication guideline. Tech. rep., NIST, 2006
-
(2006)
Electronic Authentication Guideline
-
-
Burr, W.E.1
Dodson, D.F.2
Polk, W.T.3
-
11
-
-
79956068379
-
Impact of restrictive composition policy on user password choices
-
Campbell, J., Ma, W., and Kleeman, D. Impact of restrictive composition policy on user password choices. Behaviour & Information Technology 30, 3 (2011)
-
(2011)
Behaviour & Information Technology
, vol.30
, Issue.3
-
-
Campbell, J.1
Ma, W.2
Kleeman, D.3
-
12
-
-
74049149728
-
Multiple password interference in text passwords and click-based graphical passwords
-
Chiasson, S., Forget, A., Stobert, E., van Oorschot, P. C., and Biddle, R. Multiple password interference in text passwords and click-based graphical passwords. In Proc. CCS (2009)
-
(2009)
Proc. CCS
-
-
Chiasson, S.1
Forget, A.2
Stobert, E.3
Van Oorschot, P.C.4
Biddle, R.5
-
15
-
-
84883103217
-
On the ecological validity of a password study
-
Fahl, S., Harbach, M., Acar, Y., and Smith, M. On the ecological validity of a password study. In Proc. SOUPS (2013)
-
(2013)
Proc. SOUPS
-
-
Fahl, S.1
Harbach, M.2
Acar, Y.3
Smith, M.4
-
16
-
-
35248846782
-
Password management strategies for online accounts
-
Gaw, S., and Felten, E. W. Password management strategies for online accounts. In Proc. SOUPS (2006)
-
(2006)
Proc. SOUPS
-
-
Gaw, S.1
Felten, E.W.2
-
17
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
Herley, C., and Van Oorschot, P. A research agenda acknowledging the persistence of passwords. IEEE Security and Privacy 10, 1 (2012), 28-36
-
(2012)
IEEE Security and Privacy
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.2
-
19
-
-
79955930037
-
The true cost of unusable password policies: Password use in the wild
-
Inglesant, P., and Sasse, M. A. The true cost of unusable password policies: Password use in the wild. In Proc. CHI (2010)
-
(2010)
Proc. CHI
-
-
Inglesant, P.1
Sasse, M.A.2
-
20
-
-
70749087044
-
A behavioral analysis of passphrase design and effectiveness
-
Keith, M., Shao, B., and Steinbart, P. A behavioral analysis of passphrase design and effectiveness. Journal of the Association for Information Systems 10, 2 (2009), 63-89
-
(2009)
Journal of the Association for Information Systems
, vol.10
, Issue.2
, pp. 63-89
-
-
Keith, M.1
Shao, B.2
Steinbart, P.3
-
21
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
Kelley, P. G., Komanduri, S., Mazurek, M. L., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., and Lopez, J. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proc. IEEE SP (2012)
-
(2012)
Proc. IEEE SP
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
22
-
-
84874875222
-
Of passwords and people: Measuring the effect of password-composition policies
-
Komanduri, S., Shay, R., Kelley, P. G., Mazurek, M. L., Bauer, L., Christin, N., Cranor, L. F., and Egelman, S. Of passwords and people: Measuring the effect of password-composition policies. In Proc. CHI (2011)
-
(2011)
Proc. CHI
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
23
-
-
84889053137
-
Measuring password guessability for an entire university
-
Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., Kelley, P. G., Shay, R., and Ur, B. Measuring password guessability for an entire university. In Proc. CCS (2013)
-
(2013)
Proc. CCS
-
-
Mazurek, M.L.1
Komanduri, S.2
Vidas, T.3
Bauer, L.4
Christin, N.5
Cranor, L.F.6
Kelley, P.G.7
Shay, R.8
Ur, B.9
-
24
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
Narayanan, A., and Shmatikov, V. Fast dictionary attacks on passwords using time-space tradeoff. In Proc. CCS (2005)
-
(2005)
Proc. CCS
-
-
Narayanan, A.1
Shmatikov, V.2
-
25
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
Proctor, R. W., Lien, M.-C., Vu, K.-P. L., Schultz, E. E., and Salvendy, G. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Res. Methods, Instruments, & Computers 34, 2 (2002), 163-169
-
(2002)
Behavior Res. Methods, Instruments, & Computers
, vol.34
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.-C.2
Vu, K.-P.L.3
Schultz, E.E.4
Salvendy, G.5
-
26
-
-
85071080463
-
Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
-
Schechter, S., Herley, C., and Mitzenmacher, M. Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks. In Proc. HotSec (2010)
-
(2010)
Proc. HotSec
-
-
Schechter, S.1
Herley, C.2
Mitzenmacher, M.3
-
27
-
-
84865029255
-
Correct horse battery staple: Exploring the usability of system-assigned passphrases
-
Shay, R., Kelley, P. G., Komanduri, S., Mazurek, M. L., Ur, B., Vidas, T., Bauer, L., Christin, N., and Cranor, L. F. Correct horse battery staple: Exploring the usability of system-assigned passphrases. In Proc. SOUPS (2012)
-
(2012)
Proc. SOUPS
-
-
Shay, R.1
Kelley, P.G.2
Komanduri, S.3
Mazurek, M.L.4
Ur, B.5
Vidas, T.6
Bauer, L.7
Christin, N.8
Cranor, L.F.9
-
28
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
Shay, R., Komanduri, S., Kelley, P. G., Leon, P. G., Mazurek, M. L., Bauer, L., Christin, N., and Cranor, L. F. Encountering stronger password requirements: User attitudes and behaviors. In Proc. SOUPS (2010)
-
(2010)
Proc. SOUPS
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
Leon, P.G.4
Mazurek, M.L.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
-
29
-
-
0026869371
-
OPUS: Preventing weak password choices
-
Spafford, E. H. OPUS: Preventing weak password choices. Computers & Security 11, 3 (1992)
-
(1992)
Computers & Security
, vol.11
, Issue.3
-
-
Spafford, E.H.1
-
30
-
-
84979173757
-
How does your password measure up? the effect of strength meters on password creation
-
Ur, B., Kelley, P. G., Komanduri, S., Lee, J., Maass, M., Mazurek, M., Passaro, T., Shay, R., Vidas, T., Bauer, L., Christin, N., and Cranor, L. F. How does your password measure up? The effect of strength meters on password creation. In Proc. USENIX Security (2012)
-
(2012)
Proc. USENIX Security
-
-
Ur, B.1
Kelley, P.G.2
Komanduri, S.3
Lee, J.4
Maass, M.5
Mazurek, M.6
Passaro, T.7
Shay, R.8
Vidas, T.9
Bauer, L.10
Christin, N.11
Cranor, L.F.12
-
31
-
-
78650009077
-
If your password is 123456, just make it HackMe
-
January
-
Vance, A. If your password is 123456, just make it HackMe. The New York Times, http://www. nytimes. com/2010/01/21/technology/21password. html, January 2010
-
(2010)
The New York Times
-
-
Vance, A.1
-
32
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
Vu, K.-P. L., Proctor, R. W., Bhargav-Spantzel, A., Tai, B.-L. B., and Cook, J. Improving password security and memorability to protect personal and organizational information. Int. J. of Human-Comp. Studies 65, 8 (2007), 744-757
-
(2007)
Int. J. of Human-Comp. Studies
, vol.65
, Issue.8
, pp. 744-757
-
-
Vu L, K.-P.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.B.4
Cook, J.5
-
33
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
Weir, M., Aggarwal, S., Collins, M., and Stern, H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. CCS (2010)
-
(2010)
Proc. CCS
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
34
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
Weir, M., Aggarwal, S., Medeiros, B. d., and Glodek, B. Password cracking using probabilistic context-free grammars. In Proc. IEEE SP (2009)
-
(2009)
Proc. IEEE SP
-
-
Weir, M.1
Aggarwal, S.2
Glodek, B.3
-
35
-
-
0033277446
-
Password security: An empirical study
-
Zviran, M., and Haga, W. J. Password security: An empirical study. J. Mgt. Info. Sys. 15, 4 (1999).
-
(1999)
J. Mgt. Info. Sys.
, vol.15
, Issue.4
-
-
Zviran, M.1
Haga, W.J.2
|