Where do security policies come from?
Proceedings of the Sixth Symposium on Usable Privacy and Security
Is Everything We Know about Password Stealing Wrong?
IEEE Security and Privacy
Honeywords: making password-cracking detectable
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
SAuth: protecting user accounts from password database leaks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 48.22 |
Our authentication system is lacking. Is improvement possible?