-
2
-
-
0029238493
-
Improving system security via proactive password checking
-
BISHOP, M., AND KLEIN, D. V. Improving system security via proactive password checking. Computers & Security 14, 3 (1995), 233–249.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D.V.2
-
3
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
BONNEAU, J. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE Symposium on Security and Privacy (2012).
-
(2012)
Proc. IEEE Symposium on Security and Privacy
-
-
Bonneau, J.1
-
4
-
-
84856150067
-
What’s in a name? Evaluating statistical attacks on personal knowledge questions
-
BONNEAU, J., JUST, M., AND MATTHEWS, G. What’s in a name? Evaluating statistical attacks on personal knowledge questions. In Proc. Financial Crypto (2010).
-
(2010)
Proc. Financial Crypto
-
-
Bonneau, J.1
Just, M.2
Matthews, G.3
-
5
-
-
79960392344
-
Amazon’s Mechanical Turk: A new source of inexpensive, yet high-quality, data?
-
BUHRMESTER, M., KWANG, T., AND GOSLING, S. D. Amazon’s Mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on Psychological Science 6, 1 (2011), 3–5.
-
(2011)
Perspectives on Psychological Science
, vol.6
, Issue.1
, pp. 3-5
-
-
Buhrmester, M.1
Kwang, T.2
Gosling, S.D.3
-
6
-
-
27544477471
-
-
Tech. rep., NIST
-
BURR, W. E., DODSON, D. F., AND POLK, W. T. Electronic authentication guideline. Tech. rep., NIST, 2006.
-
(2006)
Electronic Authentication Guideline
-
-
Burr, W.E.1
Dodson, D.F.2
Polk, W.T.3
-
8
-
-
77955426956
-
The impact of progress indicators on task completion
-
CONRAD, F. G., COUPER, M. P., TOURANGEAU, R., AND PEYTCHEV, A. The impact of progress indicators on task completion. Interacting with computers 22, 5 (2010), 417–427.
-
(2010)
Interacting with Computers
, vol.22
, Issue.5
, pp. 417-427
-
-
Conrad, F.G.1
Couper, M.P.2
Tourangeau, R.3
Peytchev, A.4
-
10
-
-
77956235582
-
Are your participants gaming the system? Screening Mechanical Turk workers
-
DOWNS, J. S., HOLBROOK, M. B., SHENG, S., AND CRANOR, L. F. Are your participants gaming the system? Screening Mechanical Turk workers. In Proc. CHI (2010).
-
(2010)
Proc. CHI
-
-
Downs, J.S.1
Holbrook, M.B.2
Sheng, S.3
Cranor, L.F.4
-
12
-
-
35348884906
-
A large-scale study of web password habits
-
FLORÊNCIO, D., AND HERLEY, C. A large-scale study of web password habits. In Proc. WWW (2007).
-
(2007)
Proc. WWW
-
-
Florêncio, D.1
Herley, C.2
-
13
-
-
65449177711
-
Improving text passwords through persuasion
-
FORGET, A., CHIASSON, S., VAN OORSCHOT, P., AND BIDDLE, R. Improving text passwords through persuasion. In Proc. SOUPS (2008).
-
(2008)
Proc. SOUPS
-
-
Forget, A.1
Chiasson, S.2
Van Oorschot, P.3
Biddle, R.4
-
14
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
HERLEY, C. So long, and no thanks for the externalities: The rational rejection of security advice by users. In Proc. NSPW (2009).
-
(2009)
Proc. NSPW
-
-
Herley, C.1
-
15
-
-
84868351146
-
A research agenda acknowledging the persistence of passwords
-
HERLEY, C., AND VAN OORSCHOT, P. A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 99 (2011).
-
(2011)
IEEE Security & Privacy
, vol.99
-
-
Herley, C.1
Van Oorschot, P.2
-
16
-
-
79955930037
-
The true cost of unusable password policies: Password use in the wild
-
INGLESANT, P., AND SASSE, M. A. The true cost of unusable password policies: Password use in the wild. In Proc. CHI (2010).
-
(2010)
Proc. CHI
-
-
Inglesant, P.1
Sasse, M.A.2
-
18
-
-
84865012140
-
Guess Again (and Again and Again): Measuring password strength by simulating password-cracking algorithms
-
KELLEY, P. G., KOMANDURI, S., MAZUREK, M. L., SHAY, R., VIDAS, T., BAUER, L., CHRISTIN, N., CRANOR, L. F.,, AND LOPEZ, J. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proc. IEEE Symposium on Security and Privacy (2012).
-
(2012)
Proc. IEEE Symposium on Security and Privacy
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
19
-
-
39649087669
-
Developing the “nutrition facts” food label
-
KESSLER, D. A., MANDE, J. R., SCARBROUGH, F. E., SCHAPIRO, R., AND FEIDEN, K. Developing the “nutrition facts” food label. Harvard Health Policy Review 4, 2 (2003), 13–24.
-
(2003)
Harvard Health Policy Review
, vol.4
, Issue.2
, pp. 13-24
-
-
Kessler, D.A.1
Mande, J.R.2
Scarbrough, F.E.3
Schapiro, R.4
Feiden, K.5
-
20
-
-
67650081604
-
Crowdsourcing user studies with Mechanical Turk
-
KITTUR, A., CHI, E. H., AND SUH, B. Crowdsourcing user studies with Mechanical Turk. In Proc. CHI (2008).
-
(2008)
Proc. CHI
-
-
Kittur, A.1
Chi, E.H.2
Suh, B.3
-
21
-
-
84874875222
-
Of passwords and people: Measuring the effect of password-composition policies
-
KOMANDURI, S., SHAY, R., KELLEY, P. G., MAZUREK, M. L., BAUER, L., CHRISTIN, N., CRANOR, L. F., AND EGELMAN, S. Of passwords and people: Measuring the effect of password-composition policies. In Proc. CHI (2011).
-
(2011)
Proc. CHI
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
24
-
-
77950113739
-
The economist as therapist: Methodological ramifications of ‘light’ paternalism
-
Oxford University Press
-
LOEWENSTEIN, G. F., AND HAISLEY, E. C. The economist as therapist: Methodological ramifications of ‘light’ paternalism. In The Foundations of Positive and Normative Economics. Oxford University Press, 2008.
-
(2008)
The Foundations of Positive and Normative Economics
-
-
Loewenstein, G.F.1
Haisley, E.C.2
-
25
-
-
85076203496
-
-
Dec
-
MILMAN, D. A. Death to passwords, Dec. 2010. http://blogs.computerworld.com/17543/death_to_passwords.
-
(2010)
Death to Passwords
-
-
Milman, D.A.1
-
26
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
PROCTOR, R. W., LIEN, M.-C., VU, K.-P. L., SCHULTZ, E. E., AND SALVENDY, G. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Research Methods, Instruments, & Computers 34, 2 (2002), 163–169.
-
(2002)
Behavior Research Methods, Instruments, & Computers
, vol.34
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.-C.2
Vu, K.-P.L.3
Schultz, E.E.4
Salvendy, G.5
-
28
-
-
84865029255
-
Correct horse battery staple: Exploring the usability of system-assigned passphrases
-
SHAY, R., KELLEY, P. G., KOMANDURI, S., MAZUREK, M. L., UR, B., VIDAS, T., BAUER, L., CHRISTIN, N., AND CRANOR, L. F. Correct horse battery staple: Exploring the usability of system-assigned passphrases. In Proc. SOUPS (2012).
-
(2012)
Proc. SOUPS
-
-
Shay, R.1
Kelley, P.G.2
Komanduri, S.3
Mazurek, M.L.4
Ur, B.5
Vidas, T.6
Bauer, L.7
Christin, N.8
Cranor, L.F.9
-
29
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
SHAY, R., KOMANDURI, S., KELLEY, P. G., LEON, P. G., MAZUREK, M. L., BAUER, L., CHRISTIN, N., AND CRANOR, L. F. Encountering stronger password requirements: User attitudes and behaviors. In Proc. SOUPS (2010).
-
(2010)
Proc. SOUPS
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
Leon, P.G.4
Mazurek, M.L.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
-
31
-
-
85044864002
-
Motivating users to choose better passwords through peer pressure
-
SOTIRAKOPOULOS, A., MUSLUKOV, I., BEZNOSOV, K., HERLEY, C., AND EGELMAN, S. Motivating users to choose better passwords through peer pressure. In Proc. SOUPS (Poster Abstract) (2011).
-
(2011)
Proc. SOUPS (Poster Abstract)
-
-
Sotirakopoulos, A.1
Muslukov, I.2
Beznosov, K.3
Herley, C.4
Egelman, S.5
-
32
-
-
17844366573
-
Analysis of end user security behaviors
-
STANTON, J. M., STAM, K. R., MASTRANGELO, P., AND JOLTON, J. Analysis of end user security behaviors. Comp. & Security 24, 2 (2005), 124–133.
-
(2005)
Comp. & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
33
-
-
33751181707
-
Password policy: The good, the bad, and the ugly
-
SUMMERS, W. C., AND BOSWORTH, E. Password policy: The good, the bad, and the ugly. In Proc. WISICT (2004).
-
(2004)
Proc. WISICT
-
-
Summers, W.C.1
Bosworth, E.2
-
34
-
-
84903035283
-
-
Yale University Press
-
THALER, R., AND SUNSTEIN, C. Nudge: Improving decisions about health, wealth, and happiness. Yale University Press, 2008.
-
(2008)
Nudge: Improving Decisions about Health, Wealth, and Happiness
-
-
Thaler, R.1
Sunstein, C.2
-
35
-
-
84878363047
-
Utility of human-computer interactions: Toward a science of preference measurement
-
TOOMIM, M., KRIPLEAN, T., PÖRTNER, C., AND LANDAY, J. Utility of human-computer interactions: Toward a science of preference measurement. In Proc. CHI (2011).
-
(2011)
Proc. CHI
-
-
Toomim, M.1
Kriplean, T.2
Pörtner, C.3
Landay, J.4
-
36
-
-
78650009077
-
If your password is 123456, just make it hackme
-
New York edition), Jan. 21
-
VANCE, A. If your password is 123456, just make it hackme. New York Times (New York edition), Jan. 21, 2010.
-
(2010)
New York Times
-
-
Vance, A.1
-
37
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
VU, K.-P. L., PROCTOR, R. W., BHARGAV-SPANTZEL, A., TAI, B.-L. B., AND COOK, J. Improving password security and memorability to protect personal and organizational information. Int. J. of Human-Comp. Studies 65, 8 (2007), 744–757.
-
(2007)
Int. J. Of Human-Comp. Studies
, vol.65
, Issue.8
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.B.4
Cook, J.5
-
38
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
WEIR, M., AGGARWAL, S., COLLINS, M., AND STERN, H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. CCS (2010).
-
(2010)
Proc. CCS
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
39
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
WEIR, M., AGGARWAL, S., DE MEDEIROS, B., AND GLODEK, B. Password cracking using probabilistic context-free grammars. In Proc. IEEE Symposium on Security and Privacy (2009).
-
(2009)
Proc. IEEE Symposium on Security and Privacy
-
-
Weir, M.1
Aggarwal, S.2
De Medeiros, B.3
Glodek, B.4
-
40
-
-
0038707344
-
Effects of label format on knowledge acquisition and perceived readability by younger and older adults
-
WOGALTER, M., AND VIGILANTE, JR., W. Effects of label format on knowledge acquisition and perceived readability by younger and older adults. Ergonomics 46, 4 (2003), 327–344.
-
(2003)
Ergonomics
, vol.46
, Issue.4
, pp. 327-344
-
-
Wogalter, M.1
Vigilante, J.R.W.2
-
41
-
-
0242708748
-
A note on proactive password checking
-
YAN, J. J. A note on proactive password checking. In Proc. NSPW (2001).
-
(2001)
Proc. NSPW
-
-
Yan, J.J.1
-
42
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
ZHANG, Y., MONROSE, F., AND REITER, M. K. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proc. CCS (2010).
-
(2010)
Proc. CCS
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
|