1 |
D. Florencio, & C. Herley. "A large scale study of web password habits," In Proceedings of the 16th International Conference on World Wide Web, pp. 657-666, 2007.
|
2 |
S. K. Moon. "An Empirical study on the analysis of the re-using of four-digit personal identification numbers -A university case," Journal of Digital Policy & Management, vol. 11, no. 10, pp. 737-746, 2013.
|
3 |
R. Shay, S. Komanduri, P. G. Kelley, L. Bauer, P. G. Leon, N. Christin, M. L. Mazur & L. F. Cranor, "Encountering stronger password requirements: User attitudes and behaviors," Symposium on Usable Privacy and Security (SOUPS), July, pp. 14-16, 2010.
|
4 |
A. S. Brown, E. Bracken, S. Zoccoli & K. Douglas, "Generating and remembering passwords," Applied Cognitive Psychology, 18, pp. 641-651, 2004.
DOI
|
5 |
G. Beate & J. Hilary, "Using and managing multiple passwords : A Week to a View," Interacting with Computers, 23, pp. 256-267, 2011.
DOI
|
6 |
Bersch, C. Outdated, "insecure passwords are losing money for Internet businesses," Communications News, 37, pp. 10-11, 2000.
|
7 |
R. Dhamija & A. Perrig, "Deja vu: a user study. Using images for authentication," Proceedings of the 9th USENIX Security Symposium, Denver, Colorado. 2000.
|
8 |
S. Komanduri, et al., "Of passwords and people: Measuring the effect of password composition policies," In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2595-2604, 2011.
|
9 |
A. Adams & M. A. Sasse, "Users are not the enemy," Communications of the ACM, vol. 42, no. 12, pp. 40-46, 1999.
DOI
|
10 |
Most common iPhone passcodes(2011), http://amitay.us/blog/files/most_common_iphone_passcodes.php (accessed Apr., 24, 2013).
|
11 |
S. K. Moon, "A case study on comparative analysis of four-digit passwords usage type before and after using smart phone," Journal of Convergence for Information Technology, vol. 8, no. 7, pp. 615-622, 2018.
DOI
|
12 |
L.T. Ha and D.J. Choi, "Biometrics-based Key Generation Research: Accomplishments and Challenges," Smart Media Journal, vol. 6, no. 2, pp. 15-25, 2017.
|
13 |
H.T. Tran, I.S. Na, Y.C. Kim and S.H. Kim, "Human Face Tracking and Modeling using Active Appearance Model with Motion Estimation," Smart Media Journal, vol. 6, no. 3, pp. 49-56, 2017.
|
14 |
D.N. Tai, S.H. Kim, G.S. Lee, H.J. Yang, I.S. Na and A.R. Oh, "Tracking by Detection of Multiple Faces using SSD and CNN Features," Smart Media Journal, vol. 7, no. 4, pp. 61-69, 2018.
DOI
|
15 |
B. Bostjan, T. Viktor, "Moore's curse on textual passwords," 38th International Convention on Information and Communication Technology, Electronics and Microelectronics(MIPRO), pp. 25-29, 2015.
|
16 |
P. G. Inglesant & M. A. Sasse. "The true cost of unusable password policies: Password use in the wild," In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 383-392, 2010.
|