-
1
-
-
0029238493
-
Improving system security via proactive password checking
-
BISHOP, M., and VKLEIN, D. Improving system security via proactive password checking. Computers & Security 14, 3 (1995), 233-249.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Vklein, D.2
-
2
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
May
-
BONNEAU, J. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In 2012 IEEE Symposium on Security and Privacy (May 2012).
-
(2012)
2012 IEEE Symposium on Security and Privacy
-
-
Bonneau, J.1
-
3
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
-
May
-
BONNEAU, J., HERLEY, C., VAN OORSCHOT, P. C., AND STA-JANO, F. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In 2012 IEEE Symposium on Security and Privacy (May 2012).
-
(2012)
2012 IEEE Symposium on Security and Privacy
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Sta-Jano, F.4
-
6
-
-
84877958414
-
Does my password go up to eleven?: The impact of password meters on password selection
-
EGELMAN, S., SOTIRAKOPOULOS, A., MUSLUKHOV, I., BEZNOSOV, K., and HERLEY, C. Does my password go up to eleven?: the impact of password meters on password selection. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2013), ACM, pp. 2379-2388.
-
(2013)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 2379-2388
-
-
Egelman, S.1
Sotirakopoulos, A.2
Muslukhov, I.3
Beznosov, K.4
Herley, C.5
-
7
-
-
84883103217
-
On the ecological validity of a password study
-
ACM, p
-
FAHL, S., HARBACH, M., ACAR, Y., and SMITH, M. On the ecological validity of a password study. In Proceedings of the Ninth Symposium on Usable Privacy and Security (2013), ACM, p. 13.
-
(2013)
Proceedings of the Ninth Symposium on Usable Privacy and Security
, pp. 13
-
-
Fahl, S.1
Harbach, M.2
Acar, Y.3
Smith, M.4
-
8
-
-
84865041518
-
Where do security policies come from?
-
FLORÊNCIO, D., and HERLEY, C. Where Do Security Policies Come From? Proc. SOUPS (2010).
-
(2010)
Proc. SOUPS
-
-
Florêncio, D.1
Herley, C.2
-
9
-
-
85076308990
-
-
How secure is my password. https://howsecureismypassword.net/.
-
-
-
-
12
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
KELLEY, P. G., KOMANDURI, S., MAZUREK, M. L., SHAY, R., VIDAS, T., BAUER, L., CHRISTIN, N., and CRANOR., L. F., AND LÓPEZ, J. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. IEEE Symposium on Security and Privacy 0 (2012), 523-537.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 523-537
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
López, J.9
-
13
-
-
79958161706
-
Of passwords and people: Measuring the effect of password-composition policies
-
New York, NY, USA CHI '11, ACM
-
KOMANDURI, S., SHAY, R., KELLEY, P. G., and MAZUREK., M. L., BAUER, L., CHRISTIN, N., CRANOR, L. F., and EGELMAN, S. Of passwords and people: measuring the effect of password-composition policies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2011), CHI '11, ACM, pp. 2595-2604.
-
(2011)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 2595-2604
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
14
-
-
84860859593
-
Investigating the distribution of password choices
-
MALONE, D., and MAHER, K. Investigating the distribution of password choices. In Proc. WWW (2012).
-
(2012)
Proc. WWW
-
-
Malone, D.1
Maher, K.2
-
15
-
-
84889053137
-
Measuring password Guessability for an entire University
-
MAZUREK, M. L., KOMANDURI, S., VIDAS, T., BAUER, L., CHRISTIN, N., CRANOR, L. F., and KELLEY., P. G., SHAY, R., and UR, B. Measuring password guessability for an entire university. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), ACM, pp. 173-186.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 173-186
-
-
Mazurek, M.L.1
Komanduri, S.2
Vidas, T.3
Bauer, L.4
Christin, N.5
Cranor, L.F.6
Kelley, P.G.7
Shay, R.8
Ur, B.9
-
16
-
-
85076302805
-
-
MICROSOFT CORPORATION. Check your passwordis it strong? https://www.microsoft.com/en-gb/security/pc-security/password-checker.aspx.
-
Check Your Passwordis It Strong?
-
-
-
17
-
-
85076314334
-
TechNet configuring password policies
-
MICROSOFT CORPORATION. TechNet Configuring Password Policies. Microsoft TechNet. http://msdn.microsoft.com/en-us/library/cc236715.aspx.
-
Microsoft TechNet
-
-
-
18
-
-
85076291294
-
Windows NT 4.0 domain controller configuration checklist
-
MICROSOFT CORPORATION. Windows NT 4.0 Domain Controller Configuration Checklist. Microsoft TechNet. http://technet.microsoft.com/en-us/library/cc722923.aspx.
-
Microsoft TechNet
-
-
-
19
-
-
0018543411
-
Password security: A case history
-
MORRIS, R., and THOMPSON, K. Password security: A case history. Communications of the ACM 22, 11 (1979), 594-597.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
20
-
-
85076294477
-
-
The password meter. http://www.passwordmeter.com/.
-
-
-
-
22
-
-
34548786769
-
The emperors new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
May
-
SCHECHTER, S. E., DHAMIJA, R., OZMENT, A., and FISCHER, I. The emperors new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In In Proceedings of the 2007 IEEE Symposium on Security and Privacy (May 2007).
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
24
-
-
84865029255
-
Correct horse battery staple: Exploring the usability of system-assigned passphrases
-
New York, NY, USA SOUPS '12, ACM
-
SHAY, R., and KELLEY., P. G., KOMANDURI, S., MAZUREK, M. L., UR, B., VIDAS, T., BAUER, L., CHRISTIN, N., and CRANOR, L. F. Correct horse battery staple: exploring the usability of system-assigned passphrases. In Proceedings of the Eighth Symposium on Usable Privacy and Security (New York, NY, USA, 2012), SOUPS '12, ACM, pp. 7:1-7:20.
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security
, pp. 71-720
-
-
Shay, R.1
Kelley, P.G.2
Komanduri, S.3
Mazurek, M.L.4
Ur, B.5
Vidas, T.6
Bauer, L.7
Christin, N.8
Cranor, L.F.9
-
25
-
-
84900451653
-
Can long passwords be secure and usable?
-
SHAY, R., KOMANDURI, S., DURITY, A. L., and HUH., P. S., MAZUREK, M. L., SEGRETI, S. M., UR, B., BAUER, L., CHRISTIN, N., and CRANOR, L. F. Can long passwords be secure and usable? In CHI (2014).
-
(2014)
CHI
-
-
Shay, R.1
Komanduri, S.2
Durity, A.L.3
Huh, P.S.4
Mazurek, M.L.5
Segreti, S.M.6
Ur, B.7
Bauer, L.8
Christin, N.9
Cranor, L.F.10
-
26
-
-
0026869371
-
OPUS: Preventing weak password choices
-
SPAFFORD, E. H. OPUS: Preventing weak password choices. Computers & Security 11, 3 (1992), 273-278.
-
(1992)
Computers & Security
, vol.11
, Issue.3
, pp. 273-278
-
-
Spafford, E.H.1
-
27
-
-
77950845925
-
Symmetric cryptography in Javascript
-
STARK, E., HAMBURG, M., and BONEH, D. Symmetric Cryptography in Javascript. In Annual Computer Security Applications Conference (2009), pp. 373-381.
-
(2009)
Annual Computer Security Applications Conference
, pp. 373-381
-
-
Stark, E.1
Hamburg, M.2
Boneh, D.3
-
28
-
-
84979173757
-
How does your password measure up? The effect of strength meters on password creation
-
Aug. 8-10
-
UR, B., and KELLEY., P. G., KOMANDURI, S., LEE, J., MAASS, M., and MAZUREK., M. L., PASSARO, T., SHAY, R., VIDAS, T., BAUER, L., CHRISTIN, N., and CRANOR, L. F. How does your password measure up? the effect of strength meters on password creation. In Proceedings of the 21st USENIX Security Symposium (Aug. 8-10 2012).
-
(2012)
Proceedings of the 21st USENIX Security Symposium
-
-
Ur, B.1
Kelley, P.G.2
Komanduri, S.3
Lee, J.4
Maass, M.5
Mazurek, M.L.6
Passaro, T.7
Shay, R.8
Vidas, T.9
Bauer, L.10
Christin, N.11
Cranor, L.F.12
-
29
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
New York, NY, USA CCS '10, ACM
-
WEIR, M., AGGARWAL, S., COLLINS, M., and STERN, H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM conference on Computer and communications security (New York, NY, USA, 2010), CCS '10, ACM, pp. 162-175.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
|