-
1
-
-
12844259531
-
Secure or usable?
-
Cranor, L. and S. Garfinkel, “Secure or Usable?,” IEEE Security & Privacy, 2(5), 16-18, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 16-18
-
-
Cranor, L.1
Garfinkel, S.2
-
2
-
-
0242708745
-
Pretty good persuasion: A first step to effective password security in the real world
-
September 11-13, Cloudcroft, NM
-
Weirich, D. and M. Sasse, “Pretty Good Persuasion: A First Step to Effective Password Security in the Real World,” Proceedings of the 2001 Workshop on New Security Paradigms, pp. 137-143, September 11-13, Cloudcroft, NM, 2001.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 137-143
-
-
Weirich, D.1
Sasse, M.2
-
3
-
-
33751181707
-
Password policy: The good, the bad, the ugly
-
Cancun, Mexico
-
Summers, W. and E. Bosworth, “Password Policy: The Good, The Bad, The Ugly,” Proceedings of the Winter International Symposium on Information and Communication Technologies, Cancun, Mexico, 2004, pp. 1-6.
-
(2004)
Proceedings of the Winter International Symposium on Information and Communication Technologies
, pp. 1-6
-
-
Summers, W.1
Bosworth, E.2
-
4
-
-
4243096135
-
The domino effect of password reuse
-
Ives, B., K. Walsh, and H. Schneider, “The Domino Effect of Password Reuse,” Communications of the ACM, 47(4), 75-78, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.2
Schneider, H.3
-
6
-
-
0043232732
-
Users are not the enemy
-
Adams, A. and M. Sasse: “Users Are Not the Enemy,” Communications of the ACM, 42(12), 40-46, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.2
-
7
-
-
84869031038
-
Hci and security systems
-
Ft. Lauderdale, FL
-
Patrick, A., A. Long, and S. Flinn, “HCI and Security Systems,” Conference on Human Factors in Computing Systems — CHI ‘03, Ft. Lauderdale, FL, April 2003, pp. 1056-1057.
-
(2003)
Conference on Human Factors in Computing Systems
, pp. 1056-1057
-
-
Patrick, A.1
Long, A.2
Flinn, S.3
-
8
-
-
12844251094
-
Securing user passwords
-
Patterson, B., “Securing User Passwords,” Communications of the ACM, 43(4), 11-12, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 11-12
-
-
Patterson, B.1
-
9
-
-
12844275960
-
Password memorability and security: Empirical results
-
Yan, J., A. Blackwell, R. Anderson, and A. Grant, “Password Memorability and Security: Empirical Results,” IEEE Security & Privacy, 2(5), 25-31, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
10
-
-
0038687701
-
Securing passwords against dictionary attacks
-
Washington, D.C.
-
Pinkas, B. and T. Sander, “Securing Passwords against Dictionary Attacks,” Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington, D.C., November 2002, pp. 161-170.
-
(2002)
Proceedings of the Ninth ACM Conference on Computer and Communications Security
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
11
-
-
84873800880
-
Putting it together: A multi-dimensional approach to internet security
-
Avolio, F., “Putting It Together: A Multi-Dimensional Approach to Internet Security,” net Worker, 2(2), 15-22, 1998.
-
(1998)
Net Worker
, vol.2
, Issue.2
, pp. 15-22
-
-
Avolio, F.1
-
12
-
-
0742290133
-
An introduction to biometric recognition
-
Jain, A.K., A. Ross, and S. Prabhakar, “An Introduction to Biometric Recognition,” IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4-20, 2004.
-
(2004)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
13
-
-
0031373072
-
Cognitive, associative and conventional passwords: Recall and guessing rates
-
Bunnell, J., J. Podd, R. Henderson, R. Napier, and J. Kennedy-Moffatt, “Cognitive, Associative and Conventional Passwords: Recall and Guessing Rates,” Computers & Security, 16(7), 1997.
-
(1997)
Computers & Security
, vol.16
, Issue.7
-
-
Bunnell, J.1
Podd, J.2
Henderson, R.3
Napier, R.4
Kennedy-Moffatt, J.5
-
14
-
-
85023789408
-
-
December, http://www.spirit.com/Network/net0101.html
-
Farrow, R., “Not So Secret Passwords,” December 2004, http://www.spirit.com/Network/net0101.html.
-
(2004)
-
-
Farrow, R.1
-
15
-
-
85023829781
-
-
August 19, available at http://msdn.microsoft.com/library/default.asp? url=/library/en-us/dncapi/html/pkcs12.asp
-
Coleridge, R., “The Cryptography API, or How to Keep a Secret,” August 19, 1996, available at http://msdn.microsoft.com/library/default.asp? url=/library/en-us/dncapi/html/pkcs12.asp.
-
(1996)
-
-
Coleridge, R.1
-
16
-
-
85023881316
-
-
March 8, 2004, http://blogs. msdn.com/shawnfa/archive/2004/03/08/86233. aspx
-
Farkas, S., “Which Cryptographic Operations Are Available?,” March 8, 2004, http://blogs. msdn.com/shawnfa/archive/2004/03/08/86233. aspx.
-
Which Cryptographic Operations are Available?
-
-
Farkas, S.1
-
18
-
-
85023841161
-
-
November 13
-
Bolyard, N., “Re: Password Manager File,” November 13, 2002, available at http://groups- beta.google.com/group/netscape.public.mozilla. security/msg/d8b5fc4a5553de64.
-
Re: Password Manager File
-
-
Bolyard, N.1
-
19
-
-
85023803507
-
-
October 2003, http://www.staikos.net/~staikos/papers/2003/kwallet-kastle-2003.ps
-
Staikos, G., “KWallet — The KDE Wallet System,” October 2003, http://www.staikos.net/~staikos/papers/2003/kwallet-kastle-2003.ps.
-
-
-
Staikos, G.1
-
21
-
-
85023810935
-
-
McGraw-Hill/Osborne, Berkeley, CA
-
Hatch, B., J. Lee, and G. Kurtz, Hacking Linux Exposed, 2nd ed., McGraw-Hill/Osborne, Berkeley, CA, 2003, p. 381.
-
(2003)
Hacking Linux Exposed, 2Nd Ed
, pp. 381
-
-
Hatch, B.1
Lee, J.2
Kurtz, G.3
-
22
-
-
85023832546
-
-
November 2004, available at http://dot.kde.org/1100328273/1100333612/1100342945/1100347133/1100348011/1100362286/1100438646
-
Staikos, G., “Re: Password less Wallets,” November 2004, available at http://dot.kde.org/1100328273/1100333612/1100342945/1100347133/1100348011/1100362286/1100438646.
-
Re: Password less Wallets
-
-
Staikos, G.1
|