An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Communications of the ACM
Password security: a case history
Communications of the ACM
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Design and evaluation of a shoulder-surfing resistant graphical password scheme
Proceedings of the working conference on Advanced visual interfaces
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
The usability of passphrases for authentication: An empirical field study
International Journal of Human-Computer Studies
Improving password security and memorability to protect personal and organizational information
International Journal of Human-Computer Studies
Attitudes and practices of students towards password security
Journal of Computing Sciences in Colleges
Challenges and architectural approaches for authenticating mobile users
Proceedings of the 1st international workshop on Software architectures and mobility
The Good and Not So Good of Enforcing Password Composition Rules
Information Systems Security
Weak Password Security: An Empirical Study
Information Security Journal: A Global Perspective
Network authentication using single sign-on: the challenge of aligning mental models
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A biologically inspired password authentication system
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Interacting with Computers
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Towards privacy-enhancing identity management in mashup-providing platforms
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Optimising password security through key-pattern analysis
International Journal of Internet Technology and Secured Transactions
Of passwords and people: measuring the effect of password-composition policies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A diary study of password usage in daily life
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using and managing multiple passwords: A week to a view
Interacting with Computers
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Demo: a comprehensive framework enabling data-minimizing authentication
Proceedings of the 18th ACM conference on Computer and communications security
Secure mobile sales force automation: the case of independent sales agencies
Information Systems and e-Business Management
Website credential storage and two-factor web authentication with a java SIM
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Rational security: Modelling everyday password use
International Journal of Human-Computer Studies
A calculus for privacy-friendly authentication
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Proceedings of the 14th Annual International Conference on Electronic Commerce
Learning from early attempts to measure information security performance
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Cracking associative passwords
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
A hybrid approach for highly available and secure storage of Pseudo-SSO credentials
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Goals and Practices in Maintaining Information Systems Security
International Journal of Information Security and Privacy
Age-related performance issues for PIN and face-based authentication systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The password allocation problem: strategies for reusing passwords effectively
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Useful password hashing: how to waste computing cycles with style
Proceedings of the 2013 workshop on New security paradigms workshop
International Journal of Human-Computer Studies
Hi-index | 0.00 |
One weak spot is all it takes to open secured digital doors and online accounts causing untold damage and consequences.