메뉴 건너뛰기




Volumn , Issue , 2014, Pages 607-623

Towards reliable storage of 56-bit secrets in human memory

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 85060180093     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (90)

References (95)
  • 1
    • 85076269835 scopus 로고    scopus 로고
    • HashCat project. http://hashcat.net/hashcat/.
  • 2
    • 33750922440 scopus 로고
    • NIST Federal Information Processing Standards Publication
    • "Automated Password Generator (APG)". NIST Federal Information Processing Standards Publication (1993).
    • (1993) Automated Password Generator (APG)
  • 4
    • 0242444871 scopus 로고    scopus 로고
    • Making passwords secure and usable
    • Springer London
    • ADAMS, A., and SASSE., M. A., and LUNT, P. Making passwords secure and usable. In People and Computers XII. Springer London, 1997, pp. 1-19.
    • (1997) People and Computers XII , pp. 1-19
    • Adams, A.1    Sasse, M.A.2    Lunt, P.3
  • 9
    • 0026554483 scopus 로고
    • Working memory
    • 5044
    • BADDELEY, A. Working memory. Science 255, 5044 (1992), 556-559.
    • (1992) Science , vol.255 , pp. 556-559
    • Baddeley, A.1
  • 12
    • 84855656434 scopus 로고    scopus 로고
    • A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation
    • BICAKCI, K., and VAN OORSCHOT, P. C. A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation. In Proceedings of the 2011 New Security Paradigms Workshop (2011), ACM, pp. 25-36.
    • (2011) Proceedings of the 2011 New Security Paradigms Workshop , pp. 25-36
    • Bicakci, K.1    Van Oorschot, P.C.2
  • 14
    • 0015799240 scopus 로고
    • Long-lasting potentiation of synap-tic transmission in the dentate area of the anaesthetized rabbit following stimulation of the perforant path
    • BLISS, T. V., AND LØMO, T. Long-lasting potentiation of synap-tic transmission in the dentate area of the anaesthetized rabbit following stimulation of the perforant path. The Journal of Physiology 232, 2 (1973), 331-356.
    • (1973) The Journal of Physiology , vol.232 , Issue.2 , pp. 331-356
    • Bliss, T.V.1    Lømo, T.2
  • 19
    • 85076324605 scopus 로고    scopus 로고
    • Moore's law won't kill passwords
    • January
    • BONNEAU, J. Moore's Law won't kill passwords. Light Blue Touchpaper, January 2013.
    • (2013) Light Blue Touchpaper
    • Bonneau, J.1
  • 27
    • 77954408430 scopus 로고    scopus 로고
    • The google web 1T 5-gram corpus
    • Linguistic Data Consortium
    • BRANTZ, T., and FRANZ, A. The Google Web 1T 5-gram corpus. Tech. Rep. LDC2006T13, Linguistic Data Consortium, 2006.
    • (2006) Tech. Rep. LDC2006T13
    • Brantz, T.1    Franz, A.2
  • 29
    • 84869675754 scopus 로고    scopus 로고
    • Prompted user retrieval of secret entropy: The passmaze protocol
    • BROWN, D. R. Prompted User Retrieval of Secret Entropy: The Passmaze Protocol. IACR Cryptology ePrint Archive 2005 (2005), 434.
    • (2005) IACR Cryptology EPrint Archive , vol.2005 , pp. 434
    • Brown, D.R.1
  • 30
    • 0031373072 scopus 로고    scopus 로고
    • Cognitive, associative and conventional passwords: Recall and guessing rates
    • BUNNELL, J., PODD, J., HENDERSON, R., NAPIER, R., and KENNEDY-MOFFAT, J. Cognitive, associative and conventional passwords: Recall and guessing rates. Computers & Security 16, 7 (1997), 629-641.
    • (1997) Computers & Security , vol.16 , Issue.7 , pp. 629-641
    • Bunnell, J.1    Podd, J.2    Henderson, R.3    Napier, R.4    Kennedy-Moffat, J.5
  • 33
    • 33644875555 scopus 로고    scopus 로고
    • Long-term memory is the representational basis for semantic verbal short-term memory
    • CAMERON, K. A., and HAARMANN., H. J., GRAFMAN, J., and RUCHKIN, D. S. Long-term memory is the representational basis for semantic verbal short-term memory. Psychophysiology 42, 6 (2005), 643-653.
    • (2005) Psychophysiology , vol.42 , Issue.6 , pp. 643-653
    • Cameron, K.A.1    Haarmann, H.J.2    Grafman, J.3    Ruchkin, D.S.4
  • 35
    • 33744908588 scopus 로고    scopus 로고
    • Distributed practice in verbal recall tasks: A review and quantitative synthesis
    • CEPEDA, N. J., PASHLER, H., VUL, E., WIXTED, J. T., and ROHRER, D. Distributed practice in verbal recall tasks: A review and quantitative synthesis. Psychological Bulletin 132, 3 (2006), 354.
    • (2006) Psychological Bulletin , vol.132 , Issue.3 , pp. 354
    • Cepeda, N.J.1    Pashler, H.2    Vul, E.3    Wixted, J.T.4    Rohrer, D.5
  • 39
  • 40
    • 85084161493 scopus 로고    scopus 로고
    • Déjà vu: A user study using images for authentication
    • Berkeley, CA, USA SSYM'00, USENIX Association
    • DHAMIJA, R., and PERRIG, A. Déjà Vu: A User Study Using Images for Authentication. In Proceedings of the 9th Conference on USENIX Security Symposium - Volume 9 (Berkeley, CA, USA, 2000), SSYM'00, USENIX Association, pp. 4-4.
    • (2000) Proceedings of the 9th Conference on USENIX Security Symposium , vol.9 , pp. 4
    • Dhamija, R.1    Perrig, A.2
  • 41
    • 33745629609 scopus 로고    scopus 로고
    • Perfectly secure password protocols in the bounded retrieval model
    • Springer
    • DI CRESCENZO, G., LIPTON, R., and WALFISH, S. Perfectly secure password protocols in the bounded retrieval model. In Theory of Cryptography. Springer, 2006, pp. 225-244.
    • (2006) Theory of Cryptography , pp. 225-244
    • Di Crescenzo, G.1    Lipton, R.2    Walfish, S.3
  • 50
    • 33846318568 scopus 로고    scopus 로고
    • Have the cake and eat it too - Infusing usability into text-password based authentication systems
    • JEYARAMAN, S., and TOPKARA, U. Have the cake and eat it too - Infusing usability into text-password based authentication systems. In Computer Security Applications Conference, 21st Annual (2005), IEEE.
    • (2005) Computer Security Applications Conference, 21st Annual
    • Jeyaraman, S.1    Topkara, U.2
  • 51
    • 33846274013 scopus 로고    scopus 로고
    • The base16, base32, and base64 data encodings
    • Oct.
    • JOSEFSSON, S. The Base16, Base32, and Base64 Data Encodings. RFC 4648 (Proposed Standard), Oct. 2006.
    • (2006) RFC 4648 (Proposed Standard)
    • Josefsson, S.1
  • 53
    • 34548170744 scopus 로고    scopus 로고
    • Expanding retrieval practice promotes short-term retention, but equally spaced retrieval enhances long-term retention
    • KARPICKE, J. D., and ROEDIGER III, H. L. Expanding retrieval practice promotes short-term retention, but equally spaced retrieval enhances long-term retention. Journal of Experimental Psychology: Learning, Memory, and Cognition 33, 4 (2007), 704.
    • (2007) Journal of Experimental Psychology: Learning, Memory, and Cognition , vol.33 , Issue.4 , pp. 704
    • Karpicke, J.D.1    Roediger, H.L.2
  • 61
    • 33751176315 scopus 로고
    • Easily remembered passphrases: A better approach
    • Sept.
    • KURZBAN, S. A. Easily Remembered Passphrases: A Better Approach. SIGSAC Rev. 3, 2-4 (Sept. 1985), 10-21.
    • (1985) SIGSAC Rev. , vol.3 , Issue.2-4 , pp. 10-21
    • Kurzban, S.A.1
  • 62
    • 0001061461 scopus 로고
    • Optimum rehearsal patterns and name learning
    • M. M. Gruneberg, PE Morris, & RN Sykes (Eds.)
    • LANDAUER, T., and BJORK, R. Optimum rehearsal patterns and name learning. In M. M. Gruneberg, PE Morris, & RN Sykes (Eds.), Practical aspects of memory (pp. 625-632), 1978.
    • (1978) Practical Aspects of Memory , pp. 625-632
    • Landauer, T.1    Bjork, R.2
  • 63
    • 84868361482 scopus 로고    scopus 로고
    • LASTPASS. LastPass Security Notification. http://blog.lastpass.com/2011/05/lastpass-security-notification.html.
    • LastPass Security Notification
  • 64
    • 47649109511 scopus 로고    scopus 로고
    • A comparative study of three random password generators
    • LEONHARD, M. D., and VENKATAKRISHNAN, V. A comparative study of three random password generators. In IEEE EIT (2007).
    • (2007) IEEE EIT
    • Leonhard, M.D.1    Venkatakrishnan, V.2
  • 66
    • 0018543411 scopus 로고
    • Password security: A case history
    • MORRIS, R., and THOMPSON, K. Password Security: A Case History. Communications of the ACM 22, 11 (1979), 594-597.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 73
    • 65449137148 scopus 로고    scopus 로고
    • Personal knowledge questions for fallback authentication: Security questions in the era of facebook
    • RABKIN, A. Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. In Proceedings of the 4th Symposium on Usable Privacy and Security (2008), ACM, pp. 13-23.
    • (2008) Proceedings of the 4th Symposium on Usable Privacy and Security , pp. 13-23
    • Rabkin, A.1
  • 75
    • 78651262360 scopus 로고    scopus 로고
    • Performing the unexplainable: Implicit task performance reveals individually reliable sequence learning without explicit knowledge
    • SANCHEZ, D. J., and GOBEL., E. W., and REBER, P. J. Performing the unexplainable: Implicit task performance reveals individually reliable sequence learning without explicit knowledge. Psychonomic Bulletin & Review 17, 6 (2010), 790-796.
    • (2010) Psychonomic Bulletin & Review , vol.17 , Issue.6 , pp. 790-796
    • Sanchez, D.J.1    Gobel, E.W.2    Reber, P.J.3
  • 76
    • 70449688213 scopus 로고    scopus 로고
    • It's no secret. Measuring the security and reliability of authentication via "Secret" questions
    • SCHECHTER, S., and BRUSH., A. B., and EGELMAN, S. It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions. In Security and Privacy, 2009 30th IEEE Symposium on (2009), IEEE, pp. 375-390.
    • (2009) Security and Privacy, 2009 30th IEEE Symposium on , pp. 375-390
    • Schechter, S.1    Brush, A.B.2    Egelman, S.3
  • 79
    • 57049145197 scopus 로고
    • Studies of interference in serial verbal reactions
    • Dec.
    • STROOP, J. R. Studies of Interference in Serial Verbal Reactions. Journal of Experimental Psychology 18, 6 (Dec. 1935), 643-662.
    • (1935) Journal of Experimental Psychology , vol.18 , Issue.6 , pp. 643-662
    • Stroop, J.R.1
  • 81
    • 77958098545 scopus 로고    scopus 로고
    • Pass-go: A proposal to improve the usability of graphical passwords
    • TAO, H., and ADAMS, C. Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. IJ Network Security 7, 2 (2008), 273-292.
    • (2008) IJ Network Security , vol.7 , Issue.2 , pp. 273-292
    • Tao, H.1    Adams, C.2
  • 84
    • 78751535295 scopus 로고    scopus 로고
    • Exploiting predictability in click-based graphical passwords
    • VAN OORSCHOT, P. C., and THORPE, J. Exploiting predictability in click-based graphical passwords. Journal of Computer Security 19, 4 (2011), 669-702.
    • (2011) Journal of Computer Security , vol.19 , Issue.4 , pp. 669-702
    • Van Oorschot, P.C.1    Thorpe, J.2
  • 89
    • 1842537957 scopus 로고    scopus 로고
    • The psychology and neuroscience of forgetting
    • WIXTED, J. T. The psychology and neuroscience of forgetting. Annual Psychology Review 55 (2004), 235-269.
    • (2004) Annual Psychology Review , vol.55 , pp. 235-269
    • Wixted, J.T.1
  • 91
    • 85063203163 scopus 로고    scopus 로고
    • SuperMemo 2004
    • WOZNIAK, P. SuperMemo 2004. TESL EJ 10, 4 (2007).
    • (2007) TESL EJ , vol.10 , pp. 4
    • Wozniak, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.