1 |
J. Bonneau, "The science of guessing: analyzing an anonymized corpus of 70 million passwords," Proceedings of the 33th IEEE Symposium on Security and Privacy, pp. 538-552, May. 2012.
|
2 |
X.de.C.de Carnavalet, and M. Mannan, "From very weak to very strong: Analyzing password-strength meters," Proceedings of the Network and Distributed System Security Symposium, Feb. 2014.
|
3 |
A. Das and J. Bonneau, "The tangled web of password reuse," Proceedings of the Network and Distributed System Security Symposium, Feb. 2014.
|
4 |
M. Just and D. Aspinall, "Personal choice and challenge questions: a security and usability assessment," Proceedings of the 5th Symposium on Usable Privacy and Security, pp. 8, July. 2009.
|
5 |
Jinkook Joo, "A Contrastive Semantic Analysis of English and Korean News Terminology," The Journal of translation studies, 12(3), pp. 263-279, Sep. 2011.
|
6 |
Jongki Kim and Dayeon Kang, "A Study on the Factors Affecting the Information Systems Security Effectiveness of Password," Asia Pacific Journal of Information Systems, 18(4), pp. 1-26, Dec. 2008.
DOI
|
7 |
Wonwoo Lee, Statistics clearly written, Pakyoungsa, pp. 157-172, Sep. 2009.
|
8 |
R. Shay, S. Komanduri, A.L. Durity, P. Huh, M.L. Mazurek, S.M. Segreti, B. Ur, L. Bauer, N. Christin, and F. Cranor "Can long passwords be secure and usable?," Proceedings of the 32nd annual ACM conference on Human factors in computing systems, pp. 2927-2936, Apr. 2014.
|
9 |
R. Shay, S. Komanduri, P.G. Kelley, P.G. Leon, M.L. Mazurek, L. Bauer, N. Christin, and L.F. Cranor "Encountering stronger password requirements: user attitudes and behaviors," Proceedings of the Sixth Symposium on Usable Privacy and Security, pp. 2:1-2:20, July. 2010.
|
10 |
E. Stobert and R. Biddle, "The password life cycle: user behaviour in managing passwords," Proceedings of the Symposium on Usable Privacy and Security, pp. 243-255, July. 2014.
|
11 |
R. Veras, C. Collins, and J. Thorpe, "On the semantic patterns of passwords and their security impact," Proceedings of Network and Distributed System Security Symposium, Feb. 2014.
|
12 |
B. Ur, F. Noma, J. Bees, S.M. Seqreti, R. Shay, L. Bauer, N. Christin, and L.F. Cranor, ""I Added '!' at the End to Make It Secure":Observing Password Creation in the Lab," Proceeding of the 11th Annual Symposium on Usable Privacy and Security, pp. 123-140, July. 2015.
|