The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for usernames with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2007 (15) 2008-2022 (13)
Publication types (Num. hits)
article(12) inproceedings(16)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 35 occurrences of 33 keywords

Results
Found 28 publication records. Showing 28 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
105Marlene R. Pratto Toward a uniform user interface at UNCG. Search on Bibsonomy SIGUCCS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
89Benjamin M. Gross, Elizabeth F. Churchill Addressing constraints: multiple usernames task spillage and notions of identity. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2007 DBLP  DOI  BibTeX  RDF interview study, usernames, collaboration, instant messaging, email, identity, task, identifier
63William P. Murphy III EMS: a homegrown identity management system. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF HR, peoplesoft, username, web, email, identity, website, web-based, PHP, inventory, MySQL, human resources, ID, employee
32Adam Coates 0003 Academic journals' usernames and the threat of fraudulent accounts on social media. Search on Bibsonomy Learn. Publ. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Eva Anastasiadi, Elias Athanasopoulos, Evangelos P. Markatos The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. Search on Bibsonomy SECRYPT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Önder Çoban An Analysis on Identifying Real Names of Users from Usernames. Search on Bibsonomy SIU The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Solomiia Fedushko, Yuriy Syerov, Oleksandr Skybinskyi, Nataliya Shakhovska, Zoryana Kunch Efficiency of Using Utility for Usernames Verification in Online Community Management. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
32Md. Mahmudur Rahman, Shahadat Hossain, Mimun Barid, Md. Manzurul Hasan Inductions of Usernames' Strengths in Reducing Invasions on Social Networking Sites (SNSs). Search on Bibsonomy ICO The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Peter Saint-Andre, Alexey Melnikov 0001 Preparation, Enforcement, and Comparison of Internationalized Strings Representing Usernames and Passwords. Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
32Yubin Wang, Tingwen Liu, Qingfeng Tan, Jinqiao Shi, Li Guo 0001 Identifying Users across Different Sites using Usernames. Search on Bibsonomy ICCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Gabriella M. Harari, Lindsay T. Graham, Samuel D. Gosling Personality Impressions of World of Warcraft Players Based on Their Avatars and Usernames: Consensus but No Accuracy. Search on Bibsonomy Int. J. Gaming Comput. Mediat. Simulations The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Peter Saint-Andre, Alexey Melnikov 0001 Preparation, Enforcement, and Comparison of Internationalized Strings Representing Usernames and Passwords. Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils How Unique and Traceable are Usernames? Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
32Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils How Unique and Traceable Are Usernames? Search on Bibsonomy PETS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
32Karen M. Cornetto, Kristine L. Nowak Utilizing Usernames for Sex Categorization in Computer-Mediated Communication: Examining Perceptions and Accuracy. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Adam Moskowitz On Choosing Usernames. Search on Bibsonomy login Usenix Mag. The full citation details ... 2003 DBLP  BibTeX  RDF
21Huajun Huang, Shaohong Zhong, Junshan Tan Browser-Side Countermeasures for Deceptive Phishing Attack. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb Pharewell to Phishing. Search on Bibsonomy SSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Naveen Agarwal, Scott G. Renfro, Arturo Bejar Phishing Forbidden. Search on Bibsonomy ACM Queue The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Daniel Ramsbrock, Robin Berthier, Michel Cukier Profiling Attacker Behavior Following SSH Compromises. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh Phishing attacks and solutions. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP
21Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh 0001 Using the mobile phone as a security token for unified authentication. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentcation, mobility
21Nick Bartlow, Bojan Cukic Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. Search on Bibsonomy ISSRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21John P. Watt, Oluwafemi O. Ajayi, Jipu Jiang, Jos Koetsier, Richard O. Sinnott A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Jakob E. Bardram The trouble with login: on usability and computer security in ubiquitous computing. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Electronic patient record (EPR), Ubiquitous computing, Computer-supported cooperative work (CSCW), Healthcare, User authentication, Hospitals, Activity-based computing (ABC), Login
21Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen Graphical Passwords: A Survey. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21David J. Scott, Richard Sharp Specifying and Enforcing Application-Level Web Security Policies. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Application-level Web security, security policy description languages, component-based design
21Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer On secure and pseudonymous client-relationships with multiple servers. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Janus function, mailbox, persistent relationship, privacy, anonymity, pseudonym
Displaying result #1 - #28 of 28 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license