메뉴 건너뛰기




Volumn , Issue , 1996, Pages 304-305

Cost-effective computer security: Cognitive and associative passwords

Author keywords

Computers; Passwords; Response words; Security

Indexed keywords

AUTHENTICATION; COMPUTERS; COST EFFECTIVENESS; INTERACTIVE COMPUTER SYSTEMS;

EID: 84985933266     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/OZCHI.1996.560026     Document Type: Conference Paper
Times cited : (18)

References (9)
  • 2
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • Klein, D. (1990). Foiling the cracker: A survey of, and improvements to, password security. Proceedings of the USENIX Security Workshop.
    • (1990) Proceedings of the USENIX Security Workshop
    • Klein, D.1
  • 3
    • 0024768109 scopus 로고
    • Passwords in use in a university timesharing environment
    • Riddle, B. L., Miron, M. S., &Semo, J. A. (1989). Passwords in use in a university timesharing environment. Computers and Security, 8, 569-579.
    • (1989) Computers and Security , vol.8 , pp. 569-579
    • Riddle, B.L.1    Miron, M.S.2    Semo, J.A.3
  • 4
    • 0040846914 scopus 로고
    • Computer (insecurity: Infiltrating open systems
    • In P. Denning (Ed. ), N. Y.: ACM Press
    • Whitten, I. H. (1990). Computer (insecurity: Infiltrating open systems. In P. Denning (Ed. ), Computers under Attack. N. Y.: ACM Press.
    • (1990) Computers under Attack
    • Whitten, I.H.1
  • 5
    • 0023995273 scopus 로고
    • Understanding the use of passwords
    • Menkus, B. (1988). Understanding the use of passwords. Computers and Security, 7, 132-136.
    • (1988) Computers and Security , vol.7 , pp. 132-136
    • Menkus, B.1
  • 6
    • 0039068594 scopus 로고
    • Authenticating users by word association
    • Smith, S. L. (1987). Authenticating users by word association. Computers and Security, 6, 464-470.
    • (1987) Computers and Security , vol.6 , pp. 464-470
    • Smith, S.L.1
  • 7
    • 0025545602 scopus 로고
    • Cognitive passwords: The key to easy access control
    • Zviran, M. &Haga, W. J. (1990). Cognitive passwords: The key to easy access control. Computers and Security, 9, 723-736.
    • (1990) Computers and Security , vol.9 , pp. 723-736
    • Zviran, M.1    Haga, W.J.2
  • 8
    • 0003369812 scopus 로고
    • A comparison of password techniques for multi level authentication mechanisms
    • Zviran, M., &Haga, W. J. (1993). A comparison of password techniques for multi level authentication mechanisms. Journal of Computing, 36, 227-237.
    • (1993) Journal of Computing , vol.36 , pp. 227-237
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.