-
1
-
-
85076269835
-
-
HashCat project. http://hashcat.net/hashcat/.
-
-
-
-
2
-
-
33750922440
-
-
NIST Federal Information Processing Standards Publication
-
"Automated Password Generator (APG)". NIST Federal Information Processing Standards Publication (1993).
-
(1993)
Automated Password Generator (APG)
-
-
-
4
-
-
0242444871
-
Making passwords secure and usable
-
Springer London
-
ADAMS, A., and SASSE., M. A., and LUNT, P. Making passwords secure and usable. In People and Computers XII. Springer London, 1997, pp. 1-19.
-
(1997)
People and Computers XII
, pp. 1-19
-
-
Adams, A.1
Sasse, M.A.2
Lunt, P.3
-
7
-
-
0034593185
-
Natural language processing for information assurance and security: An overview and implementations
-
ATALLAH, M. J., and MCDONOUGH., C. J., RASKIN, V., and NIRENBURG, S. Natural language processing for information assurance and security: an overview and implementations. In Proceedings of the 2000 New Security Paradigms Workshop (2001), ACM, pp. 51-65.
-
(2001)
Proceedings of the 2000 New Security Paradigms Workshop
, pp. 51-65
-
-
Atallah, M.J.1
Mcdonough, C.J.2
Raskin, V.3
Nirenburg, S.4
-
9
-
-
0026554483
-
Working memory
-
5044
-
BADDELEY, A. Working memory. Science 255, 5044 (1992), 556-559.
-
(1992)
Science
, vol.255
, pp. 556-559
-
-
Baddeley, A.1
-
11
-
-
84920659501
-
Is expanded retrieval practice a superior form of spaced retrieval? A critical review of the extant literature
-
BALOTA, D. A., and DUCHEK., J. M., and LOGAN, J. M. Is expanded retrieval practice a superior form of spaced retrieval? A critical review of the extant literature. The foundations of remembering: Essays in honor of Henry L. Roediger, III (2007), 83-105.
-
(2007)
The Foundations of Remembering: Essays in Honor of Henry L. Roediger
, vol.3
, pp. 83-105
-
-
Balota, D.A.1
Duchek, J.M.2
Logan, J.M.3
-
12
-
-
84855656434
-
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation
-
BICAKCI, K., and VAN OORSCHOT, P. C. A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation. In Proceedings of the 2011 New Security Paradigms Workshop (2011), ACM, pp. 25-36.
-
(2011)
Proceedings of the 2011 New Security Paradigms Workshop
, pp. 25-36
-
-
Bicakci, K.1
Van Oorschot, P.C.2
-
13
-
-
84866496149
-
Graphical passwords: Learning from the first twelve years
-
BIDDLE, R., CHIASSON, S., and VAN OORSCHOT, P. C. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR) 44, 4 (2012), 19.
-
(2012)
ACM Computing Surveys (CSUR)
, vol.44
, Issue.4
, pp. 19
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.C.3
-
14
-
-
0015799240
-
Long-lasting potentiation of synap-tic transmission in the dentate area of the anaesthetized rabbit following stimulation of the perforant path
-
BLISS, T. V., AND LØMO, T. Long-lasting potentiation of synap-tic transmission in the dentate area of the anaesthetized rabbit following stimulation of the perforant path. The Journal of Physiology 232, 2 (1973), 331-356.
-
(1973)
The Journal of Physiology
, vol.232
, Issue.2
, pp. 331-356
-
-
Bliss, T.V.1
Lømo, T.2
-
16
-
-
84892375701
-
Naturally rehearsing passwords
-
Springer
-
BLOCKI, J., BLUM, M., and DATTA, A. Naturally rehearsing passwords. In Advances in Cryptology-ASIACRYPT 2013. Springer, 2013, pp. 361-380.
-
(2013)
Advances in Cryptology-ASIACRYPT 2013
, pp. 361-380
-
-
Blocki, J.1
Blum, M.2
Datta, A.3
-
17
-
-
84893328361
-
Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks
-
BOJINOV, H., SANCHEZ, D., REBER, P., BONEH, D., and LINCOLN, P. Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks. In Proceedings of the 21st USENIX Security Symposium (2012).
-
(2012)
Proceedings of the 21st USENIX Security Symposium
-
-
Bojinov, H.1
Sanchez, D.2
Reber, P.3
Boneh, D.4
Lincoln, P.5
-
19
-
-
85076324605
-
Moore's law won't kill passwords
-
January
-
BONNEAU, J. Moore's Law won't kill passwords. Light Blue Touchpaper, January 2013.
-
(2013)
Light Blue Touchpaper
-
-
Bonneau, J.1
-
20
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
-
May
-
BONNEAU, J., HERLEY, C., VAN OORSCHOT, P. C., AND STA-JANO, F. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In 2012 IEEE Symposium on Security and Privacy (May 2012).
-
(2012)
2012 IEEE Symposium on Security and Privacy
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Sta-Jano, F.4
-
27
-
-
77954408430
-
The google web 1T 5-gram corpus
-
Linguistic Data Consortium
-
BRANTZ, T., and FRANZ, A. The Google Web 1T 5-gram corpus. Tech. Rep. LDC2006T13, Linguistic Data Consortium, 2006.
-
(2006)
Tech. Rep. LDC2006T13
-
-
Brantz, T.1
Franz, A.2
-
29
-
-
84869675754
-
Prompted user retrieval of secret entropy: The passmaze protocol
-
BROWN, D. R. Prompted User Retrieval of Secret Entropy: The Passmaze Protocol. IACR Cryptology ePrint Archive 2005 (2005), 434.
-
(2005)
IACR Cryptology EPrint Archive
, vol.2005
, pp. 434
-
-
Brown, D.R.1
-
30
-
-
0031373072
-
Cognitive, associative and conventional passwords: Recall and guessing rates
-
BUNNELL, J., PODD, J., HENDERSON, R., NAPIER, R., and KENNEDY-MOFFAT, J. Cognitive, associative and conventional passwords: Recall and guessing rates. Computers & Security 16, 7 (1997), 629-641.
-
(1997)
Computers & Security
, vol.16
, Issue.7
, pp. 629-641
-
-
Bunnell, J.1
Podd, J.2
Henderson, R.3
Napier, R.4
Kennedy-Moffat, J.5
-
31
-
-
33645734244
-
Proactive interference and item similarity in working memory
-
BUNTING, M. Proactive interference and item similarity in working memory. Journal of Experimental Psychology: Learning, Memory, and Cognition 32, 2 (2006), 183.
-
(2006)
Journal of Experimental Psychology: Learning, Memory, and Cognition
, vol.32
, Issue.2
, pp. 183
-
-
Bunting, M.1
-
33
-
-
33644875555
-
Long-term memory is the representational basis for semantic verbal short-term memory
-
CAMERON, K. A., and HAARMANN., H. J., GRAFMAN, J., and RUCHKIN, D. S. Long-term memory is the representational basis for semantic verbal short-term memory. Psychophysiology 42, 6 (2005), 643-653.
-
(2005)
Psychophysiology
, vol.42
, Issue.6
, pp. 643-653
-
-
Cameron, K.A.1
Haarmann, H.J.2
Grafman, J.3
Ruchkin, D.S.4
-
35
-
-
33744908588
-
Distributed practice in verbal recall tasks: A review and quantitative synthesis
-
CEPEDA, N. J., PASHLER, H., VUL, E., WIXTED, J. T., and ROHRER, D. Distributed practice in verbal recall tasks: A review and quantitative synthesis. Psychological Bulletin 132, 3 (2006), 354.
-
(2006)
Psychological Bulletin
, vol.132
, Issue.3
, pp. 354
-
-
Cepeda, N.J.1
Pashler, H.2
Vul, E.3
Wixted, J.T.4
Rohrer, D.5
-
36
-
-
84900557334
-
Influencing users towards better passwords: Persuasive cued click-points
-
British Computer Society
-
CHIASSON, S., FORGET, A., BIDDLE, R., and VAN OORSCHOT, P. C. Influencing users towards better passwords: persuasive cued click-points. In Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction-Volume 1 (2008), British Computer Society, pp. 121-130.
-
(2008)
Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction
, vol.1
, pp. 121-130
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
37
-
-
38049014958
-
Graphical password authentication using cued click points
-
Springer
-
CHIASSON, S., VAN OORSCHOT, P. C., AND BIDDLE, R. Graphical password authentication using cued click points. In Computer Security-ESORICS 2007. Springer, 2007, pp. 359-374.
-
(2007)
Computer Security-ESORICS 2007
, pp. 359-374
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
38
-
-
84994436127
-
Password exhaustion: Predicting the end of password usefulness
-
Springer
-
CLAIR, L. S., JOHANSEN, L., ENCK, W., PIRRETTI, M., TRAYNOR, P., MCDANIEL, P., and JAEGER, T. Password exhaustion: Predicting the end of password usefulness. In Information Systems Security. Springer, 2006, pp. 37-55.
-
(2006)
Information Systems Security
, pp. 37-55
-
-
Clair, L.S.1
Johansen, L.2
Enck, W.3
Pirretti, M.4
Traynor, P.5
Mcdaniel, P.6
Jaeger, T.7
-
39
-
-
85084162383
-
On user choice in graphical password schemes
-
DAVIS, D., MONROSE, F., and REITER, M. K. On User Choice in Graphical Password Schemes. In USENIX Security Symposium (2004), Vol. 13, pp. 11-11.
-
(2004)
USENIX Security Symposium
, vol.13
, pp. 11
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
40
-
-
85084161493
-
Déjà vu: A user study using images for authentication
-
Berkeley, CA, USA SSYM'00, USENIX Association
-
DHAMIJA, R., and PERRIG, A. Déjà Vu: A User Study Using Images for Authentication. In Proceedings of the 9th Conference on USENIX Security Symposium - Volume 9 (Berkeley, CA, USA, 2000), SSYM'00, USENIX Association, pp. 4-4.
-
(2000)
Proceedings of the 9th Conference on USENIX Security Symposium
, vol.9
, pp. 4
-
-
Dhamija, R.1
Perrig, A.2
-
41
-
-
33745629609
-
Perfectly secure password protocols in the bounded retrieval model
-
Springer
-
DI CRESCENZO, G., LIPTON, R., and WALFISH, S. Perfectly secure password protocols in the bounded retrieval model. In Theory of Cryptography. Springer, 2006, pp. 225-244.
-
(2006)
Theory of Cryptography
, pp. 225-244
-
-
Di Crescenzo, G.1
Lipton, R.2
Walfish, S.3
-
42
-
-
84858182438
-
Rational security: Modelling everyday password use
-
DUGGAN, G. B., JOHNSON, H., and GRAWEMEYER, B. Rational security: Modelling everyday password use. International Journal of Human-Computer Studies 70, 6 (2012), 415-431.
-
(2012)
International Journal of Human-Computer Studies
, vol.70
, Issue.6
, pp. 415-431
-
-
Duggan, G.B.1
Johnson, H.2
Grawemeyer, B.3
-
44
-
-
84883103217
-
On the ecological validity of a password study
-
FAHL, S., HARBACH, M., ACAR, Y., and SMITH, M. On the ecological validity of a password study. In Proceedings of the Ninth Symposium on Usable Privacy and Security (2013), ACM, p. 13.
-
(2013)
Proceedings of the Ninth Symposium on Usable Privacy and Security
, pp. 13
-
-
Fahl, S.1
Harbach, M.2
Acar, Y.3
Smith, M.4
-
47
-
-
0000602436
-
Spacing effects in memory: Evidence for a two-process account
-
GREENE, R. L. Spacing effects in memory: Evidence for a two-process account. Journal of Experimental Psychology: Learning, Memory, and Cognition 15, 3 (1989), 371.
-
(1989)
Journal of Experimental Psychology: Learning, Memory, and Cognition
, vol.15
, Issue.3
, pp. 371
-
-
Greene, R.L.1
-
48
-
-
70349263317
-
Quantifying the security of preference-based authentication
-
JAKOBSSON, M., YANG, L., and WETZEL, S. Quantifying the security of preference-based authentication. In Proceedings of the 4th ACM Workshop on Digital Identity Management (2008), ACM, pp. 61-70.
-
(2008)
Proceedings of the 4th ACM Workshop on Digital Identity Management
, pp. 61-70
-
-
Jakobsson, M.1
Yang, L.2
Wetzel, S.3
-
49
-
-
85084161999
-
The design and analysis of graphical passwords
-
Washington DC
-
JERMYN, I., MAYER, A., MONROSE, F., REITER, M. K., and RUBIN., A. D., et al. The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium (1999), Vol. 8, Washington DC, pp. 1-1.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, vol.8
, pp. 1
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
50
-
-
33846318568
-
Have the cake and eat it too - Infusing usability into text-password based authentication systems
-
JEYARAMAN, S., and TOPKARA, U. Have the cake and eat it too - Infusing usability into text-password based authentication systems. In Computer Security Applications Conference, 21st Annual (2005), IEEE.
-
(2005)
Computer Security Applications Conference, 21st Annual
-
-
Jeyaraman, S.1
Topkara, U.2
-
51
-
-
33846274013
-
The base16, base32, and base64 data encodings
-
Oct.
-
JOSEFSSON, S. The Base16, Base32, and Base64 Data Encodings. RFC 4648 (Proposed Standard), Oct. 2006.
-
(2006)
RFC 4648 (Proposed Standard)
-
-
Josefsson, S.1
-
52
-
-
84888997573
-
Honeywords: Making passwordcracking detectable
-
New York, NY, USA CCS '13, ACM
-
JUELS, A., and RIVEST, R. L. Honeywords: Making Passwordcracking Detectable. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (New York, NY, USA, 2013), CCS '13, ACM, pp. 145-160.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 145-160
-
-
Juels, A.1
Rivest, R.L.2
-
53
-
-
34548170744
-
Expanding retrieval practice promotes short-term retention, but equally spaced retrieval enhances long-term retention
-
KARPICKE, J. D., and ROEDIGER III, H. L. Expanding retrieval practice promotes short-term retention, but equally spaced retrieval enhances long-term retention. Journal of Experimental Psychology: Learning, Memory, and Cognition 33, 4 (2007), 704.
-
(2007)
Journal of Experimental Psychology: Learning, Memory, and Cognition
, vol.33
, Issue.4
, pp. 704
-
-
Karpicke, J.D.1
Roediger, H.L.2
-
55
-
-
33751168960
-
The usability of passphrases for authentication: An empirical field study
-
KEITH, M., SHAO, B., and STEINBART, P. J. The usability of passphrases for authentication: An empirical field study. International Journal of Human-Computer Studies 65, 1 (2007), 17-28.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, Issue.1
, pp. 17-28
-
-
Keith, M.1
Shao, B.2
Steinbart, P.J.3
-
56
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
KELLEY, P. G., KOMANDURI, S., MAZUREK, M. L., SHAY, R., VIDAS, T., BAUER, L., CHRISTIN, N., and CRANOR., L. F., and LOPEZ, J. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In 2012 IEEE Symposium on Security and Privacy (2012), IEEE, pp. 523-537.
-
(2012)
2012 IEEE Symposium on Security and Privacy
, pp. 523-537
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
57
-
-
84947906944
-
Secure applications of low-entropy keys
-
Springer
-
KELSEY, J., SCHNEIER, B., HALL, C., and WAGNER, D. Secure applications of low-entropy keys. In Information Security. Springer, 1998, pp. 121-134.
-
(1998)
Information Security
, pp. 121-134
-
-
Kelsey, J.1
Schneier, B.2
Hall, C.3
Wagner, D.4
-
59
-
-
57649217556
-
Crowdsourcing user studies with mechanical Turk
-
New York, NY, USA CHI '08, ACM
-
KITTUR, A., and CHI., E. H., and SUH, B. Crowdsourcing User Studies with Mechanical Turk. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2008), CHI '08, ACM, pp. 453-456.
-
(2008)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 453-456
-
-
Kittur, A.1
Chi, E.H.2
Suh, B.3
-
60
-
-
79958161706
-
Of passwords and people: Measuring the effect of password-composition policies
-
KOMANDURI, S., SHAY, R., KELLEY, P. G., and MAZUREK., M. L., BAUER, L., CHRISTIN, N., CRANOR, L. F., and EGELMAN, S. Of passwords and people: measuring the effect of password-composition policies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2011), ACM, pp. 2595-2604.
-
(2011)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 2595-2604
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
61
-
-
33751176315
-
Easily remembered passphrases: A better approach
-
Sept.
-
KURZBAN, S. A. Easily Remembered Passphrases: A Better Approach. SIGSAC Rev. 3, 2-4 (Sept. 1985), 10-21.
-
(1985)
SIGSAC Rev.
, vol.3
, Issue.2-4
, pp. 10-21
-
-
Kurzban, S.A.1
-
62
-
-
0001061461
-
Optimum rehearsal patterns and name learning
-
M. M. Gruneberg, PE Morris, & RN Sykes (Eds.)
-
LANDAUER, T., and BJORK, R. Optimum rehearsal patterns and name learning. In M. M. Gruneberg, PE Morris, & RN Sykes (Eds.), Practical aspects of memory (pp. 625-632), 1978.
-
(1978)
Practical Aspects of Memory
, pp. 625-632
-
-
Landauer, T.1
Bjork, R.2
-
63
-
-
84868361482
-
-
LASTPASS. LastPass Security Notification. http://blog.lastpass.com/2011/05/lastpass-security-notification.html.
-
LastPass Security Notification
-
-
-
64
-
-
47649109511
-
A comparative study of three random password generators
-
LEONHARD, M. D., and VENKATAKRISHNAN, V. A comparative study of three random password generators. In IEEE EIT (2007).
-
(2007)
IEEE EIT
-
-
Leonhard, M.D.1
Venkatakrishnan, V.2
-
66
-
-
0018543411
-
Password security: A case history
-
MORRIS, R., and THOMPSON, K. Password Security: A Case History. Communications of the ACM 22, 11 (1979), 594-597.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
68
-
-
47049121748
-
Using a model to compute the optimal schedule of practice
-
PAVLIK, P. I., and ANDERSON, J. R. Using a model to compute the optimal schedule of practice. Journal of Experimental Psychology: Applied 14, 2 (2008), 101.
-
(2008)
Journal of Experimental Psychology: Applied
, vol.14
, Issue.2
, pp. 101
-
-
Pavlik, P.I.1
Anderson, J.R.2
-
71
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
PROCTOR, R. W., LIEN, M.-C., VU, K.-P. L., SCHULTZ, E. E., AND SALVENDY, G. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Research Methods, Instruments, & Computers 34, 2 (2002), 163-169.
-
(2002)
Behavior Research Methods, Instruments, & Computers
, vol.34
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.-C.2
Vu, K.-P.L.3
Schultz, E.E.4
Salvendy, G.5
-
73
-
-
65449137148
-
Personal knowledge questions for fallback authentication: Security questions in the era of facebook
-
RABKIN, A. Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. In Proceedings of the 4th Symposium on Usable Privacy and Security (2008), ACM, pp. 13-23.
-
(2008)
Proceedings of the 4th Symposium on Usable Privacy and Security
, pp. 13-23
-
-
Rabkin, A.1
-
74
-
-
77953088193
-
Who are the crowdworkers?: Shifting demographics in mechanical Turk
-
New York, NY, USA CHI EA '10, ACM
-
ROSS, J., IRANI, L., SILBERMAN, M. S., ZALDIVAR, A., and TOMLINSON, B. Who are the Crowdworkers?: Shifting Demographics in Mechanical Turk. In CHI '10 Extended Abstracts on Human Factors in Computing Systems (New York, NY, USA, 2010), CHI EA '10, ACM, pp. 2863-2872.
-
(2010)
CHI '10 Extended Abstracts on Human Factors in Computing Systems
, pp. 2863-2872
-
-
Ross, J.1
Irani, L.2
Silberman, M.S.3
Zaldivar, A.4
Tomlinson, B.5
-
75
-
-
78651262360
-
Performing the unexplainable: Implicit task performance reveals individually reliable sequence learning without explicit knowledge
-
SANCHEZ, D. J., and GOBEL., E. W., and REBER, P. J. Performing the unexplainable: Implicit task performance reveals individually reliable sequence learning without explicit knowledge. Psychonomic Bulletin & Review 17, 6 (2010), 790-796.
-
(2010)
Psychonomic Bulletin & Review
, vol.17
, Issue.6
, pp. 790-796
-
-
Sanchez, D.J.1
Gobel, E.W.2
Reber, P.J.3
-
76
-
-
70449688213
-
It's no secret. Measuring the security and reliability of authentication via "Secret" questions
-
SCHECHTER, S., and BRUSH., A. B., and EGELMAN, S. It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions. In Security and Privacy, 2009 30th IEEE Symposium on (2009), IEEE, pp. 375-390.
-
(2009)
Security and Privacy, 2009 30th IEEE Symposium on
, pp. 375-390
-
-
Schechter, S.1
Brush, A.B.2
Egelman, S.3
-
77
-
-
84865029255
-
Correct horse battery staple: Exploring the usability of system-assigned passphrases
-
ACM, p
-
SHAY, R., and KELLEY., P. G., KOMANDURI, S., MAZUREK, M. L., UR, B., VIDAS, T., BAUER, L., CHRISTIN, N., and CRANOR, L. F. Correct horse battery staple: Exploring the usability of system-assigned passphrases. In Proceedings of the Eighth Symposium on Usable Privacy and Security (2012), ACM, p. 7.
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security
, pp. 7
-
-
Shay, R.1
Kelley, P.G.2
Komanduri, S.3
Mazurek, M.L.4
Ur, B.5
Vidas, T.6
Bauer, L.7
Christin, N.8
Cranor, L.F.9
-
79
-
-
57049145197
-
Studies of interference in serial verbal reactions
-
Dec.
-
STROOP, J. R. Studies of Interference in Serial Verbal Reactions. Journal of Experimental Psychology 18, 6 (Dec. 1935), 643-662.
-
(1935)
Journal of Experimental Psychology
, vol.18
, Issue.6
, pp. 643-662
-
-
Stroop, J.R.1
-
81
-
-
77958098545
-
Pass-go: A proposal to improve the usability of graphical passwords
-
TAO, H., and ADAMS, C. Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. IJ Network Security 7, 2 (2008), 273-292.
-
(2008)
IJ Network Security
, vol.7
, Issue.2
, pp. 273-292
-
-
Tao, H.1
Adams, C.2
-
83
-
-
39149106769
-
On predictive models and user-drawn graphical passwords
-
VAN OORSCHOT, P. C., and THORPE, J. On predictive models and user-drawn graphical passwords. ACM Transactions on Information and System Security (TISSEC) 10, 4 (2008), 5.
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.10
, Issue.4
, pp. 5
-
-
Van Oorschot, P.C.1
Thorpe, J.2
-
84
-
-
78751535295
-
Exploiting predictability in click-based graphical passwords
-
VAN OORSCHOT, P. C., and THORPE, J. Exploiting predictability in click-based graphical passwords. Journal of Computer Security 19, 4 (2011), 669-702.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.4
, pp. 669-702
-
-
Van Oorschot, P.C.1
Thorpe, J.2
-
86
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
VU, K.-P. L., PROCTOR, R. W., BHARGAV-SPANTZEL, A., TAI, B.-L. B., COOK, J., AND EUGENE SCHULTZ, E. Improving password security and memorability to protect personal and organizational information. International Journal of HumanComputer Studies 65, 8 (2007), 744-757.
-
(2007)
International Journal of HumanComputer Studies
, vol.65
, Issue.8
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.B.4
Cook, J.5
Eugene Schultz, E.6
-
87
-
-
19944375977
-
Passwords you'll never forget, but can't recall
-
New York, NY, USA CHI EA '04, ACM
-
WEINSHALL, D., and KIRKPATRICK, S. Passwords You'll Never Forget, but Can't Recall. In CHI '04 Extended Abstracts on Human Factors in Computing Systems (New York, NY, USA, 2004), CHI EA '04, ACM, pp. 1399-1402.
-
(2004)
CHI '04 Extended Abstracts on Human Factors in Computing Systems
, pp. 1399-1402
-
-
Weinshall, D.1
Kirkpatrick, S.2
-
88
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
WIEDENBECK, S., WATERS, J., BIRGET, J.-C., BRODSKIY, A., and MEMON, N. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63, 1 (2005), 102-127.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
89
-
-
1842537957
-
The psychology and neuroscience of forgetting
-
WIXTED, J. T. The psychology and neuroscience of forgetting. Annual Psychology Review 55 (2004), 235-269.
-
(2004)
Annual Psychology Review
, vol.55
, pp. 235-269
-
-
Wixted, J.T.1
-
91
-
-
85063203163
-
SuperMemo 2004
-
WOZNIAK, P. SuperMemo 2004. TESL EJ 10, 4 (2007).
-
(2007)
TESL EJ
, vol.10
, pp. 4
-
-
Wozniak, P.1
-
92
-
-
12844275960
-
Password memorability and security: Empirical results
-
YAN, J. J., and BLACKWELL., A. F., ANDERSON, R. J., and GRANT, A. Password Memorability and Security: Empirical Results. IEEE Security & privacy 2, 5 (2004), 25-31.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.J.1
Blackwell, A.F.2
Anderson, R.J.3
Grant, A.4
|