-
1
-
-
84905220771
-
-
1Password
-
1Password., https://agilebits.com/onepassword.
-
-
-
-
2
-
-
0043232732
-
Users are not the enemy
-
A. Adams, and M.A. Sasse Users are not the enemy Commun ACM 42 12 1999 40 46
-
(1999)
Commun ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
0003508558
-
-
NIST FIPS 197
-
Advanced encryption standard (AES) 2001 NIST FIPS 197 http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
6
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop, and D.V. Klein Improving system security via proactive password checking Comput Secur 14 3 1995 233 249
-
(1995)
Comput Secur
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
10
-
-
85071440512
-
Halting password puzzles: Hard-to-break encryption from human-memorable keys
-
X. Boyen Halting password puzzles: hard-to-break encryption from human-memorable keys Proceedings of the USENIX Security Symposium 2007 119 134
-
(2007)
Proceedings of the USENIX Security Symposium
, pp. 119-134
-
-
Boyen, X.1
-
11
-
-
84869383605
-
Operating system framed in case of mistaken identity: Measuring the success of web-based spoofing attacks on os password-entry dialogs
-
C. Bravo-Lillo, L. Cranor, J. Downs, S. Komanduri, S. Schechter, and M. Sleeper Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on os password-entry dialogs Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2012 365 377
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 365-377
-
-
Bravo-Lillo, C.1
Cranor, L.2
Downs, J.3
Komanduri, S.4
Schechter, S.5
Sleeper, M.6
-
12
-
-
27544477471
-
-
Special Publication 800-63-1 NIST
-
W.E. Burr, D.F. Dodson, E.M. Newton, R.A. Perlner, W.T. Polk, and S. Gupta et al. Electronic authentication guideline Special Publication 800-63-1 2011 NIST http://csrc.nist.gov/publications/nistpubs/800-63-1/SP-800-63-1.pdf
-
(2011)
Electronic Authentication Guideline
-
-
Burr, W.E.1
Dodson, D.F.2
Newton, E.M.3
Perlner, R.A.4
Polk, W.T.5
Gupta, S.6
-
15
-
-
84994436127
-
Password exhaustion: Predicting the end of password usefulness
-
L.S. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor, and P. McDaniel et al. Password exhaustion: predicting the end of password usefulness Proceedings of the International Conference on information systems security 2006 37 55
-
(2006)
Proceedings of the International Conference on Information Systems Security
, pp. 37-55
-
-
Clair, L.S.1
Johansen, L.2
Enck, W.3
Pirretti, M.4
Traynor, P.5
McDaniel, P.6
-
22
-
-
35348884906
-
A large-scale study of web password habits
-
DOI 10.1145/1242572.1242661, 16th International World Wide Web Conference, WWW2007
-
D. Florêncio, and C. Herley A large-scale study of web password habits Proceedings of the International Conference on World Wide Web (WWW) 2007 657 666 (Pubitemid 47582295)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
25
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
J.A. Halderman, S.D. Schoen, N. Heninger, W. Clarkson, W. Paul, and J.A. Calandrino et al. Lest we remember: cold boot attacks on encryption keys Proceedings of USENIX Security Symposium 2008
-
(2008)
Proceedings of USENIX Security Symposium
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
-
26
-
-
84905274762
-
Breaking our password hash habit - Why the sharing of users' password choices for defensive analysis is an underprovisioned social good, and what we can do to encourage it
-
C. Herley, and S. Schechter Breaking our password hash habit - why the sharing of users' password choices for defensive analysis is an underprovisioned social good, and what we can do to encourage it Proceedings of the Workshop on the Economics of Information Security (WEIS) 2013
-
(2013)
Proceedings of the Workshop on the Economics of Information Security (WEIS)
-
-
Herley, C.1
Schechter, S.2
-
27
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
C. Herley, and P.C. van Oorschot A research agenda acknowledging the persistence of passwords IEEE Secur Priv 10 1 2012 28 36
-
(2012)
IEEE Secur Priv
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.C.2
-
29
-
-
39049086327
-
Back to the future: A framework for automatic malware removal and system repair
-
F. Hsu, H. Chen, T. Ristenpart, J. Li, and Z. Su Back to the future: a framework for automatic malware removal and system repair Proceedings of the Annual Computer Security Applications Conference (ACSAC) 2006 257 268
-
(2006)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 257-268
-
-
Hsu, F.1
Chen, H.2
Ristenpart, T.3
Li, J.4
Su, Z.5
-
32
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
P.G. Kelley, S. Komanduri, M.L. Mazurek, R. Shay, T. Vidas, and L. Bauer et al. Guess again (and again and again): measuring password strength by simulating password-cracking algorithms Proceedings of the IEEE Symposium on Security and Privacy 2012 523 537
-
(2012)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 523-537
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
-
33
-
-
79958161706
-
Of passwords and people: Measuring the effect of password-composition policies
-
S. Komanduri, R. Shay, P.G. Kelley, M.L. Mazurek, L. Bauer, and N. Christin et al. Of passwords and people: measuring the effect of password-composition policies Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI) 2011 2595 2604
-
(2011)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI)
, pp. 2595-2604
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
-
34
-
-
0033719386
-
Risks of the passport single signon protocol
-
D.P. Kormann, and A.D. Rubin Risks of the passport single signon protocol Comput Netw 33 1-6 2000 51 58
-
(2000)
Comput Netw
, vol.33
, Issue.16
, pp. 51-58
-
-
Kormann, D.P.1
Rubin, A.D.2
-
37
-
-
84872407214
-
-
Likert scale, http://en.wikipedia.org/wiki/Likert-scale.
-
Likert Scale
-
-
-
38
-
-
48349087157
-
Enhancing web browser security against malware extensions
-
M.T. Louw, J.S. Lim, and V.N. Venkatakrishnan Enhancing web browser security against malware extensions J Comput Virology 4 3 2008 179 195
-
(2008)
J Comput Virology
, vol.4
, Issue.3
, pp. 179-195
-
-
Louw, M.T.1
Lim, J.S.2
Venkatakrishnan, V.N.3
-
40
-
-
84863181209
-
Depot: Cloud storage with minimal trust
-
P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish Depot: cloud storage with minimal trust ACM Trans Comput Syst 29 4 2011
-
(2011)
ACM Trans Comput Syst
, vol.29
, Issue.4
-
-
Mahajan, P.1
Setty, S.2
Lee, S.3
Clement, A.4
Alvisi, L.5
Dahlin, M.6
Walfish, M.7
-
41
-
-
0018543411
-
Password security: A case history
-
R. Morris, and K. Thompson Password security: a case history Commun ACM 22 11 1979 594 597
-
(1979)
Commun ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
43
-
-
84893634551
-
-
NIST: Secure hashing, http://csrc.nist.gov/groups/ST/toolkit/secure-hashing.html.
-
NIST: Secure Hashing
-
-
-
48
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J.C. Mitchell Stronger password authentication using browser extensions Proceedings of the USENIX Security Symposium 2005 17 32
-
(2005)
Proceedings of the USENIX Security Symposium
, pp. 17-32
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
49
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Commun ACM 22 11 1979 612 613
-
(1979)
Commun ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
50
-
-
84905265684
-
-
SQLite Home Page, http://www.sqlite.org.
-
Ite Home Page
-
-
-
53
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, and R.A. Kemmerer et al. Your botnet is my botnet: analysis of a botnet takeover Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2009 635 647
-
(2009)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.A.6
-
55
-
-
78751558943
-
A billion keys, but few locks: The crisis of web single sign-on
-
S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov A billion keys, but few locks: the crisis of web single sign-on Proceedings of the New security Paradigms Workshop (NSPW) 2010 61 72
-
(2010)
Proceedings of the New Security Paradigms Workshop (NSPW)
, pp. 61-72
-
-
Sun, S.-T.1
Boshmaf, Y.2
Hawkey, K.3
Beznosov, K.4
-
59
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, and S. Chen et al. Automated web patrol with strider honeymonkeys: finding web sites that exploit browser vulnerabilities Proceedings of the Annual Network & Distributed System Security Symposium (NDSS) 2006
-
(2006)
Proceedings of the Annual Network & Distributed System Security Symposium (NDSS)
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
-
60
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou Toward secure and dependable storage services in cloud computing IEEE Trans Serv Comput. 5 2 2012 220 232
-
(2012)
IEEE Trans Serv Comput.
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
61
-
-
84878355933
-
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
-
R. Wang, S. Chen, and X. Wang Signing me onto your accounts through facebook and google: a traffic-guided security study of commercially deployed single-sign-on web services Proceedings of the IEEE Symposium on Security and Privacy 2012
-
(2012)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Wang, R.1
Chen, S.2
Wang, X.3
-
63
-
-
82655182931
-
Windows azure storage: A highly available cloud storage service with strong consistency
-
Windows Azure Storage Team Windows azure storage: a highly available cloud storage service with strong consistency Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) 2011
-
(2011)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
-
64
-
-
84905220769
-
-
Windows CryptProtectData function, http://msdn.microsoft.com/en-us/library/windows/desktop/aa380261(v=vs.85).aspx.
-
Dows CryptProtectData Function
-
-
-
65
-
-
84905256840
-
-
Windows CryptUnprotectData function, http://msdn.microsoft.com/en-us/library/windows/desktop/aa380882(v=vs.85).aspx.
-
Dows CryptUnprotectData Function
-
-
-
67
-
-
34250786200
-
Web wallet: Preventing phishing attacks by revealing user intentions
-
DOI 10.1145/1143120.1143133, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
-
M. Wu, R.C. Miller, and G. Little Web wallet: preventing phishing attacks by revealing user intentions Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2006 102 113 (Pubitemid 46966973)
-
(2006)
ACM International Conference Proceeding Series
, vol.149
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
-
70
-
-
12844275960
-
Password memorability and security: Empirical results
-
DOI 10.1109/MSP.2004.81
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant Password memorability and security: empirical results IEEE Secur Priv 2 5 2004 25 31 (Pubitemid 40168623)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Alan, B.2
Anderson, R.3
Grant, A.4
-
71
-
-
34250747969
-
Passpet: Convenient password management and phishing protection
-
DOI 10.1145/1143120.1143126, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
-
K.-P. Yee, and K. Sitaker Passpet: convenient password management and phishing protection Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2006 32 43 (Pubitemid 46966967)
-
(2006)
ACM International Conference Proceeding Series
, vol.149
, pp. 32-43
-
-
Yee, K.-P.1
Sitaker, K.2
-
74
-
-
84905252411
-
Vulnerability and risk analysis of two commercial browser and cloud based password managers
-
R. Zhao, C. Yue, and K. Sun Vulnerability and risk analysis of two commercial browser and cloud based password managers ASE Sci J 1 4 2013 1 15
-
(2013)
ASE Sci J
, vol.1
, Issue.4
, pp. 1-15
-
-
Zhao, R.1
Yue, C.2
Sun, K.3
|