메뉴 건너뛰기




Volumn , Issue , 2014, Pages 2927-2936

Can long passwords be secure and usable?

Author keywords

Authentication; Password composition policies; Passwords; Security policy; Usable security

Indexed keywords

CRACKS; HUMAN ENGINEERING;

EID: 84900451653     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2556288.2557377     Document Type: Conference Paper
Times cited : (115)

References (35)
  • 1
  • 2
    • 84866496149 scopus 로고    scopus 로고
    • Graphical passwords: Learning from the first twelve years
    • Biddle, R., Chiasson, S., and van Oorschot, P. C. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys 44, 4 (2012), 19
    • (2012) ACM Computing Surveys , vol.44 , Issue.4 , pp. 19
    • Biddle, R.1    Chiasson, S.2    Van Oorschot, P.C.3
  • 3
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • Bishop, M., and Klein, D. V. Improving system security via proactive password checking. Computers & Security 14, 3 (1995), 233-249
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 5
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • Bonneau, J. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE SP (2012)
    • (2012) Proc. IEEE SP
    • Bonneau, J.1
  • 6
    • 84878353718 scopus 로고    scopus 로고
    • The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes
    • Bonneau, J., Herley, C., van Oorschot, P. C., and Stajano, F. The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes. In Proc. IEEE SP (2012)
    • (2012) Proc. IEEE SP
    • Bonneau, J.1    Herley, C.2    Van Oorschot, P.C.3    Stajano, F.4
  • 8
    • 84855714294 scopus 로고    scopus 로고
    • Anonymous speaks: The inside story of the HBGary hack
    • February
    • Bright, P. Anonymous speaks: The inside story of the HBGary hack. Ars Technica, February 2011
    • (2011) Ars Technica
    • Bright, P.1
  • 11
    • 79956068379 scopus 로고    scopus 로고
    • Impact of restrictive composition policy on user password choices
    • Campbell, J., Ma, W., and Kleeman, D. Impact of restrictive composition policy on user password choices. Behaviour & Information Technology 30, 3 (2011)
    • (2011) Behaviour & Information Technology , vol.30 , Issue.3
    • Campbell, J.1    Ma, W.2    Kleeman, D.3
  • 12
    • 74049149728 scopus 로고    scopus 로고
    • Multiple password interference in text passwords and click-based graphical passwords
    • Chiasson, S., Forget, A., Stobert, E., van Oorschot, P. C., and Biddle, R. Multiple password interference in text passwords and click-based graphical passwords. In Proc. CCS (2009)
    • (2009) Proc. CCS
    • Chiasson, S.1    Forget, A.2    Stobert, E.3    Van Oorschot, P.C.4    Biddle, R.5
  • 16
    • 35248846782 scopus 로고    scopus 로고
    • Password management strategies for online accounts
    • Gaw, S., and Felten, E. W. Password management strategies for online accounts. In Proc. SOUPS (2006)
    • (2006) Proc. SOUPS
    • Gaw, S.1    Felten, E.W.2
  • 17
    • 84859800820 scopus 로고    scopus 로고
    • A research agenda acknowledging the persistence of passwords
    • Herley, C., and Van Oorschot, P. A research agenda acknowledging the persistence of passwords. IEEE Security and Privacy 10, 1 (2012), 28-36
    • (2012) IEEE Security and Privacy , vol.10 , Issue.1 , pp. 28-36
    • Herley, C.1    Van Oorschot, P.2
  • 19
    • 79955930037 scopus 로고    scopus 로고
    • The true cost of unusable password policies: Password use in the wild
    • Inglesant, P., and Sasse, M. A. The true cost of unusable password policies: Password use in the wild. In Proc. CHI (2010)
    • (2010) Proc. CHI
    • Inglesant, P.1    Sasse, M.A.2
  • 24
    • 33745788833 scopus 로고    scopus 로고
    • Fast dictionary attacks on passwords using time-space tradeoff
    • Narayanan, A., and Shmatikov, V. Fast dictionary attacks on passwords using time-space tradeoff. In Proc. CCS (2005)
    • (2005) Proc. CCS
    • Narayanan, A.1    Shmatikov, V.2
  • 26
    • 85071080463 scopus 로고    scopus 로고
    • Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
    • Schechter, S., Herley, C., and Mitzenmacher, M. Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks. In Proc. HotSec (2010)
    • (2010) Proc. HotSec
    • Schechter, S.1    Herley, C.2    Mitzenmacher, M.3
  • 29
    • 0026869371 scopus 로고
    • OPUS: Preventing weak password choices
    • Spafford, E. H. OPUS: Preventing weak password choices. Computers & Security 11, 3 (1992)
    • (1992) Computers & Security , vol.11 , Issue.3
    • Spafford, E.H.1
  • 31
    • 78650009077 scopus 로고    scopus 로고
    • If your password is 123456, just make it HackMe
    • January
    • Vance, A. If your password is 123456, just make it HackMe. The New York Times, http://www. nytimes. com/2010/01/21/technology/21password. html, January 2010
    • (2010) The New York Times
    • Vance, A.1
  • 32
    • 34249733184 scopus 로고    scopus 로고
    • Improving password security and memorability to protect personal and organizational information
    • Vu, K.-P. L., Proctor, R. W., Bhargav-Spantzel, A., Tai, B.-L. B., and Cook, J. Improving password security and memorability to protect personal and organizational information. Int. J. of Human-Comp. Studies 65, 8 (2007), 744-757
    • (2007) Int. J. of Human-Comp. Studies , vol.65 , Issue.8 , pp. 744-757
    • Vu L, K.-P.1    Proctor, R.W.2    Bhargav-Spantzel, A.3    Tai, B.-L.B.4    Cook, J.5
  • 33
    • 78650022232 scopus 로고    scopus 로고
    • Testing metrics for password creation policies by attacking large sets of revealed passwords
    • Weir, M., Aggarwal, S., Collins, M., and Stern, H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. CCS (2010)
    • (2010) Proc. CCS
    • Weir, M.1    Aggarwal, S.2    Collins, M.3    Stern, H.4
  • 34
    • 70449688216 scopus 로고    scopus 로고
    • Password cracking using probabilistic context-free grammars
    • Weir, M., Aggarwal, S., Medeiros, B. d., and Glodek, B. Password cracking using probabilistic context-free grammars. In Proc. IEEE SP (2009)
    • (2009) Proc. IEEE SP
    • Weir, M.1    Aggarwal, S.2    Glodek, B.3
  • 35
    • 0033277446 scopus 로고    scopus 로고
    • Password security: An empirical study
    • Zviran, M., and Haga, W. J. Password security: An empirical study. J. Mgt. Info. Sys. 15, 4 (1999).
    • (1999) J. Mgt. Info. Sys. , vol.15 , Issue.4
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.