Communications of the ACM
A note on proactive password checking
Proceedings of the 2001 workshop on New security paradigms
Improving interface designs to help users choose better passwords
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Aligning usability and security: a usability study of Polaris
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Question-based authentication using context data
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
The usability of passphrases for authentication: An empirical field study
International Journal of Human-Computer Studies
Question-based group authentication
OZCHI '06 Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
A large-scale study of web password habits
Proceedings of the 16th international conference on World Wide Web
Passwords decay, words endure: secure and re-usable multiple password mnemonics
Proceedings of the 2007 ACM symposium on Applied computing
Bayesian Networks for Knowledge-Based Authentication
IEEE Transactions on Knowledge and Data Engineering
Improving password security and memorability to protect personal and organizational information
International Journal of Human-Computer Studies
Helping users create better passwords: is this the right approach?
Proceedings of the 3rd symposium on Usable privacy and security
Do background images improve "draw a secret" graphical passwords?
Proceedings of the 14th ACM conference on Computer and communications security
Attitudes and practices of students towards password security
Journal of Computing Sciences in Colleges
Memorability of persuasive passwords
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Human-seeded attacks and exploiting hot-spots in graphical passwords
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Halting password puzzles: hard-to-break encryption from human-memorable keys
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Passwords for everyone: secure mnemonic-based accessible authentication
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
The Good and Not So Good of Enforcing Password Composition Rules
Information Systems Security
Improving text passwords through persuasion
Proceedings of the 4th symposium on Usable privacy and security
Securing passfaces for description
Proceedings of the 4th symposium on Usable privacy and security
Persuasion for Stronger Passwords: Motivation and Pilot Study
PERSUASIVE '08 Proceedings of the 3rd international conference on Persuasive Technology
TwoKind authentication: protecting private information in untrustworthy environments
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Network authentication using single sign-on: the challenge of aligning mental models
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Helping users create and remember more secure text passwords
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 2
Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
N±ε: Reflecting Local Risk Assessment in LoA
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II
The true cost of unusable password policies: password use in the wild
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The effect of baroque music on the PassPoints graphical password
Proceedings of the ACM International Conference on Image and Video Retrieval
Secure passwords through enhanced hashing
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Testing metrics for password creation policies by attacking large sets of revealed passwords
Proceedings of the 17th ACM conference on Computer and communications security
Kamouflage: loss-resistant password management
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
A mobile network operator-independent mobile signature service
Journal of Network and Computer Applications
Interacting with Computers
On the usability of user interfaces for secure website authentication in browsers
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
A diary study of password usage in daily life
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using and managing multiple passwords: A week to a view
Interacting with Computers
Enhancing design science through empirical knowledge: framework and application
DESRIST'11 Proceedings of the 6th international conference on Service-oriented perspectives in design science research
A comparative usability evaluation of traditional password managers
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
AmazonIA: when elasticity snaps back
Proceedings of the 18th ACM conference on Computer and communications security
Proceedings of the 2011 workshop on New security paradigms workshop
Shoulder surfing defence for recall-based graphical passwords
Proceedings of the Seventh Symposium on Usable Privacy and Security
Enhancing login security through the use of keystroke input dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Secure mobile sales force automation: the case of independent sales agencies
Information Systems and e-Business Management
Evaluating the usability and security of a graphical one-time PIN system
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Security research from a multi-disciplinary and multi-sectoral perspective
SAFECOMP'05 Proceedings of the 24th international conference on Computer Safety, Reliability, and Security
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Phoolproof phishing prevention
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Mobile token-based authentication on a budget
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Rational security: Modelling everyday password use
International Journal of Human-Computer Studies
WebTicket: account management using printable tokens
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A calculus for privacy-friendly authentication
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
International Journal of Human-Computer Studies
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Correct horse battery staple: exploring the usability of system-assigned passphrases
Proceedings of the Eighth Symposium on Usable Privacy and Security
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Counting clicks and beeps: Exploring numerosity based haptic and audio PIN entry
Interacting with Computers
Graphical password authentication using cued click points
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Evaluating the effect of user guidelines on creating click-draw based graphical passwords
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Password entry usability and shoulder surfing susceptibility on different smartphone platforms
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
NAPTune: fine tuning graphical authentication
Proceedings of the 3rd International Conference on Human Computer Interaction
Video-passwords: advertising while authenticating
Proceedings of the 2012 workshop on New security paradigms
Cracking associative passwords
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Multiple password interference in graphical passwords
International Journal of Information and Computer Security
Linguistic properties of multi-word passphrases
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Evaluating the effect of tolerance on click-draw based graphical password scheme
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Preventing the revealing of online passwords to inappropriate websites with logininspector
lisa'12 Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques
Proceedings of the third ACM conference on Data and application security and privacy
2-clickAuth: Optical Challenge-Response Authentication Using Mobile Handsets
International Journal of Mobile Computing and Multimedia Communications
Does my password go up to eleven?: the impact of password meters on password selection
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usability and security evaluation of GeoPass: a geographic location-password scheme
Proceedings of the Ninth Symposium on Usable Privacy and Security
Pitfalls in the automated strengthening of passwords
Proceedings of the 29th Annual Computer Security Applications Conference
Faces and Pictures: Understanding age differences in two types of graphical authentications
International Journal of Human-Computer Studies
Is it really you?: user identification via adaptive behavior fingerprinting
Proceedings of the 4th ACM conference on Data and application security and privacy
International Journal of Human-Computer Studies
Hi-index | 0.00 |
Users rarely choose passwords that are both hard to guess and easy to remember. To determine how to help users choose good passwords, the authors performed a controlled trial of the effects of giving users different kinds of advice. Some of their results challenge the established wisdom.