-
1
-
-
85076286556
-
-
Stop. Think. Connect. http://www.stopthinkconnect.org/.
-
-
-
-
3
-
-
0043232732
-
Users are not the enemy
-
December
-
A. Adams and M. A. Sasse. Users are not the enemy. CACM, pages 40-46, December 1999.
-
(1999)
CACM
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
4
-
-
71749099834
-
The economics of user effort in information security
-
October
-
A. Beautement and A. Sasse. The economics of user effort in information security. Computer Fraud & Security, pages 8-12, October 2009.
-
(2009)
Computer Fraud & Security
, pp. 8-12
-
-
Beautement, A.1
Sasse, A.2
-
5
-
-
70350697293
-
The compliance budget: Managing security behaviour in organisations
-
A. Beautement, M. Sasse, and M. Wonham. The Compliance Budget: Managing Security Behaviour in Organisations. In NSPW, 2008.
-
(2008)
NSPW
-
-
Beautement, A.1
Sasse, M.2
Wonham, M.3
-
8
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE Symp. on Security and Privacy, pages 538-552, 2012.
-
(2012)
Proc. IEEE Symp. On Security and Privacy
, pp. 538-552
-
-
Bonneau, J.1
-
9
-
-
79958097346
-
The password thicket: Technical and market failures in human authentication on the web
-
J. Bonneau and S. Preibusch. The password thicket: Technical and market failures in human authentication on the web. In WEIS, 2010.
-
(2010)
WEIS
-
-
Bonneau, J.1
Preibusch, S.2
-
10
-
-
85060180093
-
Towards reliable storage of 56-bit secrets in human memory
-
J. Bonneau and S. Schechter. Towards reliable storage of 56-bit secrets in human memory. In Proc. USENIX Security, 2014.
-
(2014)
Proc. USENIX Security
-
-
Bonneau, J.1
Schechter, S.2
-
11
-
-
7744227917
-
Generating and remembering passwords
-
A. Brown, E. Bracken, S. Zoccoli, and K. Douglas. Generating and remembering passwords. Applied Cognitive Psychology, 18(6):641-651, 2004.
-
(2004)
Applied Cognitive Psychology
, vol.18
, Issue.6
, pp. 641-651
-
-
Brown, A.1
Bracken, E.2
Zoccoli, S.3
Douglas, K.4
-
13
-
-
84977277570
-
-
W. Cheswick. Rethinking passwords. USENIX LISA, 2010. http://www.usenix.org/event/lisa10/tech/slides/cheswick.pdf.
-
(2010)
Rethinking Passwords
-
-
Cheswick, W.1
-
14
-
-
84988000688
-
Rethinking passwords
-
W. Cheswick. Rethinking passwords. ACM Queue, 10(12):50-56, 2012.
-
(2012)
ACM Queue
, vol.10
, Issue.12
, pp. 50-56
-
-
Cheswick, W.1
-
16
-
-
74049149728
-
Multiple password interference in text passwords and click-based graphical passwords
-
S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle. Multiple password interference in text passwords and click-based graphical passwords. In Proc. ACM CCS, 2009.
-
(2009)
Proc. ACM CCS
-
-
Chiasson, S.1
Forget, A.2
Stobert, E.3
Van Oorschot, P.C.4
Biddle, R.5
-
17
-
-
85133463240
-
The tangled web of password reuse
-
A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang. The tangled web of password reuse. NDSS, 2014.
-
(2014)
NDSS
-
-
Das, A.1
Bonneau, J.2
Caesar, M.3
Borisov, N.4
Wang, X.5
-
18
-
-
85084161493
-
Deja vu: A user study using images for authentication
-
R. Dhamija and A. Perrig. Deja vu: a user study using images for authentication. In USENIX Security, 2000.
-
(2000)
USENIX Security
-
-
Dhamija, R.1
Perrig, A.2
-
19
-
-
85044866434
-
Does my password go up to eleven? The impact of password meters on password selection
-
S. Egelman, A. Sotirakopoulos, I. Muslukhov, K. Beznosov, and C. Herley. Does my password go up to eleven? the impact of password meters on password selection. In Proc. CHI, 2013.
-
(2013)
Proc. CHI
-
-
Egelman, S.1
Sotirakopoulos, A.2
Muslukhov, I.3
Beznosov, K.4
Herley, C.5
-
20
-
-
85076312615
-
Where do all the attacks go?
-
Fairfax, VA
-
D. Florêncio and C. Herley. Where Do All the Attacks Go? Proc. WEIS, 2011, Fairfax, VA.
-
(2011)
Proc. WEIS
-
-
Florêncio, D.1
Herley, C.2
-
21
-
-
35348884906
-
A large-scale study of web password habits
-
D. Florêncio and C. Herley. A Large-Scale Study of Web Password Habits. Proc. WWW, 2007.
-
(2007)
Proc. WWW
-
-
Florêncio, D.1
Herley, C.2
-
22
-
-
84865041518
-
Where do security policies come from?
-
D. Florêncio and C. Herley. Where Do Security Policies Come From? Proc. SOUPS, 2010.
-
(2010)
Proc. SOUPS
-
-
Florêncio, D.1
Herley, C.2
-
24
-
-
35248846782
-
Password management strategies for online accounts
-
S. Gaw and E. Felten. Password Management Strategies for Online Accounts. In ACM SOUPS, 2006.
-
(2006)
ACM SOUPS
-
-
Gaw, S.1
Felten, E.2
-
25
-
-
34547228933
-
Single password, multiple accounts
-
M. Gouda, A. Liu, L. Leung, and M. Alam. Single password, multiple accounts. In ACNS (Industry Track), 2005.
-
(2005)
ACNS (Industry Track)
-
-
Gouda, M.1
Liu, A.2
Leung, L.3
Alam, M.4
-
26
-
-
79957818269
-
Using and managing multiple passwords: A week to a view
-
B. Grawemeyer and H. Johnson. Using and managing multiple passwords: A week to a view. Interacting with Computers, 23(3):256-267, 2011.
-
(2011)
Interacting with Computers
, vol.23
, Issue.3
, pp. 256-267
-
-
Grawemeyer, B.1
Johnson, H.2
-
28
-
-
79958091082
-
A diary study of password usage in daily life
-
E. Hayashi and J. Hong. A diary study of password usage in daily life. In CHI (note), pages 2627-2630, 2011.
-
(2011)
CHI (note)
, pp. 2627-2630
-
-
Hayashi, E.1
Hong, J.2
-
29
-
-
77950877250
-
So long, and no thanks for the externalities: Rational rejection of security advice by users
-
C. Herley. So Long, And No Thanks for the Externalities: Rational Rejection of Security Advice by Users. Proc. NSPW, 2009.
-
(2009)
Proc. NSPW
-
-
Herley, C.1
-
30
-
-
79952018667
-
-
Imperva. Consumer Password Worst Practices. 2010. http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf.
-
(2010)
Consumer Password Worst Practices
-
-
-
31
-
-
77953963809
-
The true cost of unusable password policies: Password use in the wild
-
P. Inglesant and M. A. Sasse. The true cost of unusable password policies: Password use in the wild. In CHI, 2010.
-
(2010)
CHI
-
-
Inglesant, P.1
Sasse, M.A.2
-
32
-
-
4243096135
-
The domino effect of password reuse
-
B. Ives, K. Walsh, and H. Schneider. The Domino Effect of Password Reuse. C. ACM, 47(4):75-78, 2004.
-
(2004)
C. ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.2
Schneider, H.3
-
36
-
-
85076299302
-
Forum (comment)
-
A. Karp. Forum (comment). C. ACM, 47(6):11-12, 2004.
-
(2004)
C. ACM
, vol.47
, Issue.6
, pp. 11-12
-
-
Karp, A.1
-
37
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, and J. Lopez. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proc. IEEE Symp. on Security and Privacy, 2012.
-
(2012)
Proc. IEEE Symp. On Security and Privacy
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
38
-
-
85076310190
-
Yahoo breach highlights password reuse threat
-
July 7
-
R. Lemos. Yahoo breach highlights password reuse threat. eWeek. July 7, 2012.
-
(2012)
EWeek
-
-
Lemos, R.1
-
40
-
-
84995186518
-
Portfolio selection
-
H. Markowitz. Portfolio selection. The Journal of Finance, 7(1):77-91, 1952.
-
(1952)
The Journal of Finance
, vol.7
, Issue.1
, pp. 77-91
-
-
Markowitz, H.1
-
41
-
-
85076286373
-
The password allocation problem
-
Nov. 4
-
R. Nithyanand and R. Johnson. The password allocation problem. In WPES, 2013. Nov. 4, 6 pages.
-
(2013)
WPES
-
-
Nithyanand, R.1
Johnson, R.2
-
43
-
-
78650745563
-
The password game: Negative externalities from weak password practices
-
Springer Berlin Heidelberg
-
S. Preibusch and J. Bonneau. The password game: negative externalities from weak password practices. In Decision and Game Theory for Security, pages 192-207. Springer Berlin Heidelberg, 2010.
-
(2010)
Decision and Game Theory for Security
, pp. 192-207
-
-
Preibusch, S.1
Bonneau, J.2
-
44
-
-
39349101677
-
Password security: What users know and what they actually do
-
S. Riley. Password security: what users know and what they actually do. Usability News, 8(1), 2006.
-
(2006)
Usability News
, vol.8
, Issue.1
-
-
Riley, S.1
-
45
-
-
0035387175
-
Transforming the "weakest link": A human-computer interaction approach to usable and effective security
-
M. Sasse, S. Brostoff, and D. Weirich. Transforming the "weakest link": a human-computer interaction approach to usable and effective security. BT Tech. J., 19(3):122-131, 2001.
-
(2001)
BT Tech. J.
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.1
Brostoff, S.2
Weirich, D.3
-
47
-
-
84959159726
-
The password life cycle: User behaviour in managing passwords
-
E. Stobert and R. Biddle. The password life cycle: user behaviour in managing passwords. In Proc. SOUPS, 2014.
-
(2014)
Proc. SOUPS
-
-
Stobert, E.1
Biddle, R.2
-
48
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. ACM CCS, 2010.
-
(2010)
Proc. ACM CCS
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
49
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proc. ACM CCS, 2010.
-
(2010)
Proc. ACM CCS
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
|