|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 815 occurrences of 362 keywords
|
|
|
Results
Found 1094 publication records. Showing 1094 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
164 | Sonia Chiasson, Alain Forget, Elizabeth Stobert, Paul C. van Oorschot, Robert Biddle |
Multiple password interference in text passwords and click-based graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 500-511, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiple password interference, authentication, usable security, graphical passwords |
158 | Umut Topkara, Mikhail J. Atallah, Mercan Topkara |
Passwords decay, words endure: secure and re-usable multiple password mnemonics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 292-299, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
mnemonic sentence, usability, authentication, natural language processing, passwords |
141 | Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor |
Human selection of mnemonic phrase-based passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 67-78, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mnemonic phrases, password cracking, password selection, user studies |
110 | Deborah Nelson, Kim-Phuong L. Vu |
Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (8) ![In: Human Interface and the Management of Information. Designing Information Environments, Symposium on Human Interface 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Procceedings, Part I, pp. 693-701, 2009, Springer, 978-3-642-02555-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
memory training programs, retrieval strategies, passwords, mnemonics, proactive password checking |
110 | Furkan Tari, A. Ant Ozok, Stephen H. Holden |
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 56-66, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, human factors, usable security, graphical passwords, social engineering, shoulder surfing, password security |
110 | Arvind Narayanan, Vitaly Shmatikov |
Fast dictionary attacks on passwords using time-space tradeoff. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 364-372, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
time-space, cryptanalysis, Markov models, passwords, tradeoff, dictionary attack |
108 | Krzysztof Golofit |
Click Passwords Under Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 343-358, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Click Passwords, PassPoints, Passlogix, graphical authentication, picture passwords, human factor, dictionary attacks, keypad |
100 | Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
Improving text passwords through persuasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008, pp. 1-12, 2008, ACM, 978-1-60558-276-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, passwords, persuasive technology, usable security |
100 | Paul Dunphy, Jeff Yan |
Do background images improve "draw a secret" graphical passwords? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 36-47, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
draw a secret, security, usable security, graphical passwords, memorability |
98 | Paul C. van Oorschot, Julie Thorpe |
On predictive models and user-drawn graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(4), pp. 5:1-5:33, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Draw-a-Secret, graphical dictionary, memorable passwords, modeling user choice, password complexity factors, Graphical passwords, dictionary attack |
94 | Burkhard Englert, Pritesh Shah |
On the design and implementation of a secure online password vault. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 375-382, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, web services, authentication, passwords, Ajax |
93 | Norbert Tihanyi, Attila Kovács, Gergely Vargha, Ádám Lénárt |
Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 89-101, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
91 | Katherine Everitt, Tanya Bragin, James Fogarty, Tadayoshi Kohno |
A comprehensive study of frequency, interference, and training of multiple graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 889-898, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication, usable security, graphical passwords |
91 | Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
Persuasion for Stronger Passwords: Motivation and Pilot Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PERSUASIVE ![In: Persuasive Technology, Third International Conference, PERSUASIVE 2008, Oulu, Finland, June 4-6, 2008. Proceedings, pp. 140-150, 2008, Springer, 978-3-540-68500-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, computer security, passwords, Persuasive Technology, usable security |
87 | Shirley Gaw, Edward W. Felten |
Password management strategies for online accounts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 44-55, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
password reuse, security, survey, password, user behavior, password management |
81 | Paul C. van Oorschot, Tao Wan 0004 |
TwoStep: An Authentication Method Combining Text and Graphical Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCETECH ![In: E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings, pp. 233-239, 2009, Springer, 978-3-642-01186-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Phishing, User Authentication, Graphical Passwords |
81 | Alain Forget, Robert Biddle |
Memorability of persuasive passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, Florence, Italy, April 5-10, 2008, pp. 3759-3764, 2008, ACM, 978-1-60558-012-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, memory, computer security, passwords, persuasive technology, usable security, chunking |
81 | Sonia Chiasson, Robert Biddle, Paul C. van Oorschot |
A second look at the usability of click-based graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 1-12, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, user study, usable security, graphical passwords |
78 | Stig Fr. Mjølsnes (eds.) |
Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![Springer, 978-3-319-24191-3 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
78 | Mats Sandvoll, Colin Boyd, Bjørn B. Larsen |
PassCue: The Shared Cues System in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 119-137, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
78 | Kemal Bicakci, Tashtanbek Satiev |
charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 74-86, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
78 | Jonathan Millican, Frank Stajano |
SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 146-152, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
78 | Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel 0001 |
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 3-18, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
78 | Markus Dürmuth, Thorsten Kranz |
On Password Guessing with GPUs and FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 19-38, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
78 | Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser |
Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 61-73, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
78 | David Jaeger, Hendrik Graupner, Andrey Sapegin, Feng Cheng 0002, Christoph Meinel |
Gathering and Analyzing Identity Leaks for Security Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 102-115, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
78 | Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya |
Cryptographic Module Based Approach for Password Hashing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 39-57, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
78 | Amrit Kumar 0001, Cédric Lauradoux |
Private Password Auditing - Short Paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, pp. 138-145, 2014, Springer, 978-3-319-24191-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
75 | Kevser Karaca, Albert Levi |
Towards a framework for security analysis of multiple password schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 16-21, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multiple passwords, security analysis, password based authentication, impersonation |
74 | Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen |
Graphical Passwords: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 463-472, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
71 | Alain Forget |
Helping users create and remember more secure text passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (2) ![In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction - Volume 2, BCS HCI 2008, Liverpool, United Kingdom, 1-5 September 2008, pp. 247-248, 2008, BCS, 978-1-906124-06-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, games, memory, computer security, passwords, persuasion, usable security |
71 | Sonia Chiasson, Alain Forget, Robert Biddle, Paul C. van Oorschot |
Influencing users towards better passwords: persuasive cued click-points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (1) ![In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction - Volume 1, BCS HCI 2008, Liverpool, United Kingdom, 1-5 September 2008, pp. 121-130, 2008, BCS, 978-1-906124-04-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
persuasive technology, usable security, graphical passwords |
71 | Richard M. Conlan, Peter Tarasewich |
Improving interface designs to help users choose better passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 652-657, 2006, ACM, 978-1-59593-298-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
HCISEC, security, HCI, usability, user-centered design, interface design, passwords, proactive password checking |
64 | Cormac Herley, Paul C. van Oorschot, Andrew S. Patrick |
Passwords: If We're So Smart, Why Are We Still Using Them? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 230-237, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Saranga Komanduri, Dugald Ralph Hutchings |
Order and entropy in picture passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Graphics Interface ![In: Proceedings of the Graphics Interface 2008 Conference, May 28-30, 2008, Windsor, Ontario, Canada, pp. 115-122, 2008, ACM Press, 978-1-56881-423-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
graphical authentication, picture superiority, shoulder surfing |
64 | Eric R. Verheul |
Selecting Secure Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 49-66, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
64 | J. Alex Halderman, Brent Waters, Edward W. Felten |
A convenient method for securely managing passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 471-479, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
website user authentication, password security |
64 | Jonathan Katz, Rafail Ostrovsky, Moti Yung |
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 475-494, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
63 | Dinei A. F. Florêncio, Cormac Herley |
One-Time Password Access to Any Server without Changing the Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 401-420, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
replay resistance, authentication, Passwords, one-time passwords |
62 | Frank Stajano, Stig Fr. Mjølsnes, Graeme Jenkinson, Per Thorsheim (eds.) |
Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![Springer, 978-3-319-29937-2 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
62 | Hossein Siadati, Toan Nguyen 0001, Nasir D. Memon |
Verification Code Forwarding Attack (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings, pp. 65-71, 2015, Springer, 978-3-319-29937-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | AbdelRahman Abdou, David Barrera 0003, Paul C. van Oorschot |
What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings, pp. 72-91, 2015, Springer, 978-3-319-29937-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Stefan Lucks, Jakob Wenzel 0001 |
Catena Variants - Different Instantiations for an Extremely Flexible Password-Hashing Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings, pp. 95-119, 2015, Springer, 978-3-319-29937-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Simon E. Parkin, Samy Driss, Kat Krol, M. Angela Sasse |
Assessing the User Experience of Password Reset Policies in a University. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings, pp. 21-38, 2015, Springer, 978-3-319-29937-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Maximilian Golla, Markus Dürmuth |
Analyzing 4 Million Real-World Personal Knowledge Questions (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings, pp. 39-44, 2015, Springer, 978-3-319-29937-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Martin Kleppmann, Conrad Irwin |
Strengthening Public Key Authentication Against Key Theft (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings, pp. 144-150, 2015, Springer, 978-3-319-29937-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Jean Lancrenon |
On Password-Authenticated Key Exchange Security Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings, pp. 120-143, 2015, Springer, 978-3-319-29937-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Jeffrey Klardie, Konrad S. Wrona |
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings, pp. 45-61, 2015, Springer, 978-3-319-29937-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Elizabeth Stobert, Robert Biddle |
Expert Password Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASSWORDS ![In: Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings, pp. 3-20, 2015, Springer, 978-3-319-29937-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Alain Forget, Sonia Chiasson, Robert Biddle |
Input precision for gaze-based graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010, pp. 4279-4284, 2010, ACM, 978-1-60558-930-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
eye tracking, usable security, graphical passwords |
62 | Cheryl V. Hinds, Chinedu Ekwueme |
Increasing security and usability of computer systems with graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 529-530, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
usability, graphical passwords |
62 | Wendy Moncur, Grégory Leplâtre |
Pictures at the ATM: exploring the usability of multiple graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 887-894, 2007, ACM, 978-1-59593-593-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication mechanisms, ATMs, usable security, user authentication, graphical passwords |
62 | Chlotia Posey Garrison |
Encouraging good passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 109-112, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
computer fluency, security training, user awareness, access control, active learning, computer security, passwords, students, computer literacy |
58 | Stuart E. Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer |
The Emperor's New Security Indicators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 51-65, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Richard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Giovanni Leon, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
Encountering stronger password requirements: user attitudes and behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, usability, policy, survey, passwords |
54 | Hua Wang, Yao Guo 0001, Xia Zhao, Xiangqun Chen |
Keep Passwords Away from Memory: Password Caching and Verification Using TPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 755-762, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
OIAP, Password Authentication, TPM |
54 | Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot |
On Purely Automated Attacks and Click-Based Graphical Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 111-120, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee, Yoojae Won |
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Sixth International Conference on Computer and Information Technology (CIT 2006), 20-22 September 2006, Seoul, Korea, pp. 163, 2006, IEEE Computer Society, 0-7695-2687-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Julie Thorpe, Paul C. van Oorschot |
Towards Secure Design Choices for Implementing Graphical Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 50-60, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Helen M. Wood |
The use of passwords for controlling access to remote computer systems and services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1977 National Computer Conference, June 13-16, 1977, Dallas, Texas, USA, pp. 27-33, 1977, AFIPS Press, 978-1-4503-7914-4. The full citation details ...](Pics/full.jpeg) |
1977 |
DBLP DOI BibTeX RDF |
|
53 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(3), pp. 230-268, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
52 | Elizabeth Stobert |
Usability and strength in click-based graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010, pp. 4303-4308, 2010, ACM, 978-1-60558-930-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
authentication, usable security, graphical passwords |
52 | Supriya Singh, Anuja Cabraal, Catherine Demosthenous, Gunela Astbrink, Michele Furlong |
Security Design Based on Social and Cultural Practice: Sharing of Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (11) ![In: Usability and Internationalization. Global and Local User Interfaces, Second International Conference on Usability and Internationalization, UI-HCII 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 476-485, 2007, Springer, 978-3-540-73288-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
sharing passwords, social and cultural centered design, privacy across cultures, security, Banking, Australia |
52 | Alexander De Luca, Roman Weiss, Heinrich Hussmann |
PassShape: stroke based shape passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 2007 Australasian Computer-Human Interaction Conference, OZCHI 2007, Adelaide, Australia, November 28-30, 2007, pp. 239-240, 2007, ACM, 978-1-59593-872-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
PassShape, shape passwords, security, authentication |
52 | Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon |
Authentication using graphical passwords: effects of tolerance and image choice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005, pp. 1-12, 2005, ACM, 1-59593-178-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PassPoints, password images, authentication, human factors, usable security, tolerance, graphical passwords, password security |
48 | Dinei A. F. Florêncio, Cormac Herley |
A large-scale study of web password habits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 657-666, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, measurements, password |
48 | Ruben Wolf, Markus Schneider 0002 |
A note on the security of code memo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology, Mobility Conference 2007, Singapore, September 10-12, 2007, pp. 261-267, 2007, ACM, 978-1-59593-819-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
mobile applications, security analysis, password management |
48 | Stephen Keung, Kai-Yeung Siu |
Efficient protocols secure against guessing and replay attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 105, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks |
46 | Ming Ki Chong, Gary Marsden |
Exploring the Use of Discrete Gestures for Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT (2) ![In: Human-Computer Interaction - INTERACT 2009, 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedings, Part II, pp. 205-213, 2009, Springer, 978-3-642-03657-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
gesture passwords, discrete gestures, User authentication |
46 | Alain Forget, Sonia Chiasson, Robert Biddle |
Lessons from Brain Age on password memorability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Play ![In: Proceedings of the 2008 Conference on Future Play: Research, Play, Share, Future Play 2008, Toronto, Ontario, Canada, November 3-5, 2008, pp. 262-263, 2008, ACM, 978-1-60558-218-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
memory, passwords, serious games, usable security |
46 | Joseph Goldberg, Jennifer Hagman, Vibha Sazawal |
Doodling our way to better authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, CHI 2002, Minneapolis, Minnesota, USA, April 20-25, 2002, pp. 868-869, 2002, ACM, 1-58113-454-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
passdoodles, authentication, user study, passwords |
46 | Li Gong |
Optimal authentication protocols resistant to password guessing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 24-29, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks |
45 | Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck |
Constructing Passwords from Biometrical Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 889-898, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Kimmo Halunen, Pauli Rikula, Juha Röning |
Finding Preimages of Multiple Passwords Secured with VSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 499-503, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen |
The Impact of Image Choices on the Usability and Security of Click Based Graphical Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVC (2) ![In: Advances in Visual Computing, 5th International Symposium, ISVC 2009, Las Vegas, NV, USA, November 30 - December 2, 2009, Proceedings, Part II, pp. 889-898, 2009, Springer, 978-3-642-10519-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
usability, user studies, graphical password |
45 | Ming Lei, Yang Xiao 0001, Susan V. Vrbsky, Chung-Chih Li, Li Liu |
A Virtual Password Scheme to Protect Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1536-1540, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Jin Wook Byun, Dong Hoon Lee 0001 |
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 75-90, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao 0001 |
Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 328-335, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Wireless Networks, Access Control, Security Protocol |
45 | Wei-Chi Ku, Maw-Jinn Tsaur |
A Remote User Authentication Scheme Using Strong Graphical Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 351-357, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Benny Pinkas, Tomas Sander |
Securing passwords against dictionary attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 161-170, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold |
Secure Internet Banking Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 21-29, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates |
42 | Alain Forget, Sonia Chiasson, Robert Biddle |
Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1107-1110, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
eye tracking, usable security, graphical passwords |
42 | Paul Dunphy, Andreas P. Heiner, N. Asokan |
A closer look at recognition-based graphical passwords on mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mobile devices, graphical passwords, shoulder surfing |
42 | Warren Harrison |
Passwords and Passion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 23(4), pp. 5-7, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, passwords, system security |
42 | Thomas S. Tullis, Donna P. Tedesco |
Using personal photos as pictorial passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, April 2-7, 2005, pp. 1841-1844, 2005, ACM, 1-59593-002-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
pictorial passwords, user authentication, photographs, photos |
42 | Bruce Schneier |
Customers, Passwords, and Web Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 88, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Trojans, stealing passwords, phishing |
39 | Matt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek |
Password Cracking Using Probabilistic Context-Free Grammars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 391-405, 2009, IEEE Computer Society, 978-0-7695-3633-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Naveen Sundar Govindarajulu, Sriganesh Madhvanath |
Password management using doodles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMI ![In: Proceedings of the 9th International Conference on Multimodal Interfaces, ICMI 2007, Nagoya, Aichi, Japan, November 12-15, 2007, pp. 236-239, 2007, ACM, 978-1-59593-817-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
doodles, password management |
39 | Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino |
Password policy simulation and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 1-10, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
simulation, modeling, management, policy, password |
39 | Huanyu Zhao, Xiaolin Li 0001 |
S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 467-472, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger |
Password Exhaustion: Predicting the End of Password Usefulness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 37-55, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Sundararaman Jeyaraman, Umut Topkara |
Have the cake and eat it too - Infusing usability into text-password based authentication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 473-482, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Jonathan Katz, Rafail Ostrovsky, Moti Yung |
Forward Secrecy in Password-Only Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 29-44, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Niklas Frykholm, Ari Juels |
Error-tolerant password recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 1-9, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fuzzy commitment, password ensembles, password recovery, fault-tolerance, error-correcting codes, Reed-Solomon codes |
39 | John A. Trono |
Comments on "Tagged Semaphores". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 34(4), pp. 7-11, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Philip Inglesant, Martina Angela Sasse |
The true cost of unusable password policies: password use in the wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 383-392, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
password policy, passwords, usable security |
36 | Roman Weiss, Alexander De Luca |
PassShapes: utilizing stroke based authentication to increase password memorability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordiCHI ![In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction 2008, Lund, Sweden, October 20-22, 2008, pp. 383-392, 2008, ACM, 978-1-59593-704-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PassShapes, graphical authentication, shape passwords, security, authentication |
36 | Supriya Singh, Anuja Cabraal, Catherine Demosthenous, Gunela Astbrink, Michele Furlong |
Password sharing: implications for security design based on social practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 895-904, 2007, ACM, 978-1-59593-593-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
sharing passwords, social and cultural centered design, security, banking, Australia, UCD |
36 | Steven M. Bellovin |
Unconventional Wisdom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 88, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, email, passwords, single-sign-on |
36 | Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri |
Neural Network Techniques for Proactive Password Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(4), pp. 327-339, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
neural networks, machine learning, access control, passwords, System security |
Displaying result #1 - #100 of 1094 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|