Personal choice and challenge questions: a security and usability assessment
Proceedings of the 5th Symposium on Usable Privacy and Security
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication
Proceedings of the 5th Symposium on Usable Privacy and Security
Building robust authentication systems with activity-based personal questions
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Exploring implicit memory for painless password recovery
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Pictures or questions?: examining user responses to association-based authentication
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Mercury: recovering forgotten passwords using personal devices
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Towards an understanding of social inference opportunities in social computing
Proceedings of the 17th ACM international conference on Supporting group work
Exploring capturable everyday memory for autobiographical authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Usability and security evaluation of GeoPass: a geographic location-password scheme
Proceedings of the Ninth Symposium on Usable Privacy and Security
Honeywords: making password-cracking detectable
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
SAuth: protecting user accounts from password database leaks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
CloudSweeper: enabling data-centric document management for secure cloud archives
Proceedings of the 2013 ACM workshop on Cloud computing security workshop
Hand authentication on multi-touch tablets
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
Hi-index | 0.00 |
The Mifare Classic is the most widely used contactless smartcard on the market.The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious attacks have been proposed. The most serious of them retrieves a secret key ...