The Usable Security of Passwords based on Digital Objects : From Design and Analysis to User Study ∗
暂无分享,去创建一个
[1] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[2] Serge Egelman,et al. It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[3] Thomas D. Wu. A Real-World Analysis of Kerberos Password Security , 1999, NDSS.
[4] Tadayoshi Kohno,et al. A comprehensive study of frequency, interference, and training of multiple graphical passwords , 2009, CHI.
[5] Eugene H. Spafford,et al. The internet worm: crisis and aftermath , 1989 .
[6] Cormac Herley,et al. Do Strong Web Passwords Accomplish Anything? , 2007, HotSec.
[7] Moshe Zviran,et al. Cognitive passwords: The key to easy access control , 1990, Comput. Secur..
[8] Eric R. Verheul,et al. Selecting Secure Passwords , 2007, CT-RSA.
[9] R.V. Yampolskiy. Analyzing User Password Selection Behavior for Reduction of Password Space , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[10] Michael K. Reiter,et al. On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.
[11] E. Vesterinen,et al. Affective Computing , 2009, Encyclopedia of Biometrics.
[12] J. Massey. Guessing and entropy , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[13] Ka-Ping Yee,et al. Passpet: convenient password management and phishing protection , 2006, SOUPS '06.
[14] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[15] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[16] Alain Forget,et al. Improving text passwords through persuasion , 2008, SOUPS '08.
[17] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[18] Cormac Herley,et al. So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.
[19] Andrew S. Patrick,et al. Monitoring Corporate Password Sharing Using Social Network Analysis , 2008 .
[20] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1999 .
[21] Julie Thorpe,et al. On predictive models and user-drawn graphical passwords , 2008, TSEC.
[22] L. R. Peterson,et al. Short-term retention of individual verbal items. , 1959, Journal of experimental psychology.
[23] Robin Berthier,et al. Profiling Attacker Behavior Following SSH Compromises , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[24] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[25] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[26] P. V. Oorschot,et al. Multiple Password Interference in Text and Click-Based Graphical Passwords , 2008 .
[27] Jeff Yan,et al. A note on proactive password checking , 2001, NSPW '01.
[28] John O. Pliam. On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks , 2000, INDOCRYPT.
[29] Markus Jakobsson,et al. Messin' with Texas Deriving Mother's Maiden Names Using Public Records , 2005, ACNS.
[30] Robert Biddle,et al. A Usability Study and Critique of Two Password Managers , 2006, USENIX Security Symposium.