Authentication Research Paper Index

A core objective of PasswordResearch.com is to improve awareness of existing authentication research. Many valuable insights into, and solutions for, the problems associated with authentication have gone unnoticed by the people responsible for authentication security.

This project is an ongoing effort to compile and share a comprehensive, but curated, index of password and authentication related research produced by academic, industry, and government experts. We share the details of useful research, provide links to free copies of the papers (when possible), and encourage collaboration between authors and other security professionals.

If you have an appropriate research paper or other resource to add, please send a copy of the material along with details on its source to siteupdates@passwordresearch.com.

Research Paper Index

Author(s): Blase Ur, Felicia Alfieri, Maung Aung, Lujo Bauer, Nicolas Christin, Jessica Colnago
Publication: Proceedings of the 2017 SIGCHI Conference on Human Factors in Computing Systems (CHI '17) - Date: May 6 2017

Author(s): Yomna Abdelrahman, Mohamed Khamis, Stefan Schneegass, Florian Alt
Publication: Proceedings of the 2017 SIGCHI Conference on Human Factors in Computing Systems (CHI '17) - Date: May 6 2017

Author(s): Malin Eiband, Mohamed Khamis, Emanuel von Zezschwitz, Heinrich Hussmann, Florian Alt
Publication: Proceedings of the 2017 SIGCHI Conference on Human Factors in Computing Systems (CHI '17) - Date: May 6 2017

Author(s): Ding Wang, Qianchen Gu, Xinyi Huang, Ping Wang
Publication: Proceedings of the 12th ACM ASIA Conference on Computer and Communications Security (ASIA CCS '17) - Date: April 2 2017

Author(s): Johannes Kiesel, Benno Stein, Stefan Lucks
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Author(s): Sovantharith Seng, Sadia Ahmed, Mahdi Nasrullah Al-Ameen, Matthew Wright
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Author(s): Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patané, Marta Kwiatkowska, Ivan Martinovic
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Author(s): Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Author(s): Maximilian Golla, Dennis Detering, Markus Dürmuth
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Author(s): Weitao Xu, Guohao Lan, Qi Lin, Sara Khalifa, Neil Bergmann, Mahbub Hassan
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Author(s): S M Taiabul Haque, Mahdi Nasrullah Al-Ameen, Matthew Wright, Shannon Scielzo
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Author(s): Hana Habib, Jessica Colnago, William Melicher, Blase Ur, Sean M. Segreti, Lujo Bauer
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Author(s): Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt, Florian Alt
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Author(s): Claude Castelluccia, Markus Dürmuth, Maximilian Golla, Fatma Deniz
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Author(s): Jeffrey Goldberg
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 7 2016

Author(s): Khalid Mansour
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Author(s): David Jaeger, Chris Pelchen, Hendrik Graupner, Feng Cheng, Christoph Meinel
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Author(s): Emma Lilliestam
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Author(s): David Llewellyn-Jones, Graham Rymer
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 7 2016

Author(s): Peter Mayer, Hermann Berket, Melanie Volkamer
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Author(s): Toshiyuki Masui
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Author(s): Pierre-Antoine Haidar-Bachminska
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Author(s): Simon S. Woo, Jelena Mirkovic
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Author(s): Elizabeth Stobert, Irwin Reyes, Carrie Gates, Robert Biddle
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Author(s): Adrian Dabrowski, Edgar Weippl
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Author(s): Timo Kasper
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Author(s): Emma Lilliestam
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 7 2016

Author(s): Oleg Afonin
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Author(s): Manuel Urueña, Ignacio Soto Campos
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Author(s): Tony Arcieri
Publication: - Date: November 22 2016

Author(s): Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor
Publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) - Date: October 24 2016

Author(s): Maximilian Golla, Benedict Beuscher, Markus Dürmuth
Publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) - Date: October 24 2016

Author(s): Peter Mayer, Stephan Neumann, Melanie Volkamer
Publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) - Date: October 24 2016

Author(s): Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim
Publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) - Date: October 24 2016

Author(s): Weining Yang, Ninghui Li, Ian Molloy, Youngja Park, Suresh Chari
Publication: ESORICS 2016, Lecture Notes in Computer Science Volume 9878 - Date: September 26 2016

Author(s): Yusuf Albayram, Mohammad Maifi Hasan Khan
Publication: Human-centric Computing and Information Sciences, Volume 6, Number 16 - Date: September 5 2016

Author(s): Casey Cammilleri, Hans Lakhan
Publication: Derbycon 2016 - Date: September 23 2016

Author(s): John V. Monaco, Charles C. Tappert
Publication: arXiv:1609.07612 - Date: September 24 2016

Author(s): Ding Wang, Ping Wang
Publication: ESORICS 2016, Lecture Notes in Computer Science Volume 9878 - Date: September 26 2016

Author(s): Blase Ur
Publication: PhD Thesis CMU-ISR-16-110 - Date: September 2016

Author(s): Sanjiv Kawa, Tom Porter
Publication: Passwords16 Las Vegas - Date: August 3 2016

Author(s): Michal Špacek
Publication: Passwords16 Las Vegas - Date: August 3 2016

Author(s): Evan Johnson
Publication: Passwords16 Las Vegas - Date: August 2 2016

Author(s): Kirk Hayes
Publication: Passwords16 Las Vegas - Date: August 2 2016

Author(s): Matt Weir
Publication: Passwords16 Las Vegas - Date: August 3 2016

Author(s): Nick Sullivan
Publication: Passwords16 Las Vegas - Date: August 3 2016

Author(s): Florencia Herra-Vega, Skylar Nagao
Publication: Passwords16 Las Vegas - Date: August 3 2016

Author(s): Yair Yona, Suhas Diggavi
Publication: arXiv:1608.02132 - Date: August 2016

Author(s): Bruce K. Marshall
Publication: Passwords16 Las Vegas - Date: August 3 2016

Author(s): Arnold Reinhold
Publication: Passwords16 Las Vegas - Date: August 2 2016

Author(s): Terry Gold
Publication: Passwords16 Las Vegas - Date: August 3 2016

Author(s): Jim Fenton
Publication: Passwords16 Las Vegas - Date: August 2 2016

Author(s): Jeffrey Goldberg, Julie Haugh
Publication: Passwords16 Las Vegas - Date: August 2 2016

Author(s): Jean-Philippe Aumasson
Publication: Passwords16 Las Vegas - Date: August 2 2016

Author(s): Mark Burnett
Publication: Passwords16 Las Vegas - Date: August 2 2016

Author(s): Daniel Lowe Wheeler
Publication: Proceedings of the 25st USENIX Security Symposium (SEC'16) - Date: August 10 2016

Author(s): Moritz Horsch, Mario Schlipf, Johannes Braun, Johannes Buchmann
Publication: Australasian Conference on Information Security and Privacy 2016, Lecture Notes in Computer Science Volume 9722 - Date: July 4 2016

Author(s): Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer
Publication: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) - Date: July 2016

Author(s): Ding Wang, Debiao He, Haibo Cheng, Ping Wang
Publication: Proceedings of the 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016) - Date: June 2016

Author(s): Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti
Publication: ACM Transactions on Information and System Security (TISSEC), Volume 18, Issue 4 - Date: May 2016

Author(s): Rahul Chatterjee, Anish Athalye, Devdatta Akhawe, Ari Juels, Thomas Ristenpart
Publication: 37th IEEE Symposium on Security and Privacy - Date: May 2016

Author(s): Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang
Publication: Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (AISACCS 2016) - Date: May 2016

Author(s): Suphannee Sivakorn, Iasonas (Jason) Polakis, Angelos D. Keromytis
Publication: Black Hat Asia 2016 - Date: March 2016

Author(s): Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross Anderson, Nicholas Bohm, Alice Hutchings
Publication: Financial Cryptography and Data Security 2016 - Date: February 2016

Author(s): Kai Cao, Anil K. Jain
Publication: MSU Technical Report MSU-CSE-16-2 - Date: February 19 2016

Author(s): Nicolas Courtois, Guangyan Song, Ryan Castellucci
Publication: - Date: February 2016

Author(s): Henry Corrigan-Gibbs, Dan Boneh, Stuart Schechter
Publication: - Date: January 2016

Author(s): Michael Sprecher
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Maximilian Golla, Markus Dürmuth
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Maximilian Golla, Markus Dürmuth
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Author(s): Simon Parkin, Samy Driss, Kat Krol, Martina Angela Sasse
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Author(s): Sebastien Raveau
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Elena Agostini, Massimo Bernaschi
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Stefan Lucks, Jakob Wenzel
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Author(s): Khandaker Abir Rahman, Ryan Moormann, Danielle Dierich, Md. Shafaeat Hossain
Publication: Communications in Computer and Information Science, Volume 566 - Date: December 2015

Author(s): Jeunese Payne
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Dimitri Fousekis [rurapenthe]
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Igor Semaev
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Elizabeth Stobert, Robert Biddle
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Author(s): Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Jeffrey Klardie, Konrad Wrona
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Author(s): Peder Sparell, Mikael Simovits
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Jean Lancrenon
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Author(s): Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem Beyah
Publication: 2015 Annual Computer Security Applications Conference - Date: December 2015

Author(s): Per Thorsheim
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Sonia Chiasson, P.C. van Oorschot
Publication: Designs, Codes and Cryptography, Volume 77, Issue 2 - Date: December 2015

Author(s): Jeffrey Goldberg
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Martin Kleppmann, Conrad Irwin
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Author(s): Chris Wysopal [Weld Pond]
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Martina Angela Sasse
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): Hossein Siadati, Toan Nguyen, Nasir Memon
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Author(s): AbdelRahman Abdou, David Barrera, P.C. van Oorschot
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Author(s): Manuel Blum, Santosh Vempala
Publication: Third AAAI Conference on Human Computation and Crowdsourcing (HCOMP-15) - Date: November 2015

Author(s): Matteo Dell'Amico, Maurizio Filippone
Publication: Proceedings of the 22nd ACM SIGSAC Conference on Computer & Communications Security, CCS '15 - Date: October 2015

Author(s): Hao Fang, Hu Aiqun, Le Shi, Tao Li
Publication: 2015 International Conference on Wireless Communications & Signal Processing (WCSP) - Date: October 2015

Author(s): Ding Wang, Ping Wang
Publication: Proc. Of the 20th European Symposium on Research in Computer Security, ESORICS 2015. Lecture Notes in Computer Science, Volume 9327 - Date: September 2015

Author(s): Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem Beyah
Publication: IEEE Transactions on Dependable and Secure Computing, Volume PP, Issue 99 - Date: September 2015

Author(s): Björn Pirrwitz
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Steve Thomas
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Jeremy Spilman
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Christian Heinrich, Daniel Cuthbert
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Ryan Castellucci
Publication: DEF CON 23 - Date: August 2015

Author(s): Phillippe Paquet
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Bruce K. Marshall
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Michal Špacek
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri
Publication: Proceedings of the 24th USENIX Security Symposium, SEC'15 - Date: August 2015

Author(s): Mark Burnett
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Drew Hintz
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Per Thorsheim
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Joseph Birr-Pixton
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Devin Egan
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Andrey Dulkin
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Cormac Herley
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Eduardo Novella
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Jim Fenton
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Greg Zaverucha
Publication: Passwords15 Las Vegas / MSR-TR-2015-63 - Date: August 2015

Author(s): Marte Løge
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Sean M. Segreti, Blase Ur
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Jeffrey Goldberg
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Rick Redman [Minga], Dale Corpron
Publication: Passwords15 Las Vegas - Date: August 2015

Author(s): Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer
Publication: Proceedings of the 11th Symposium on Usable Privacy and Security, SOUPS '15 - Date: July 2015

Author(s): Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
Publication: 36th IEEE Symposium on Security and Privacy - Date: May 2015

Author(s): Joseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, Mike Williamson
Publication: Proceedings of the 24th international conference on World Wide Web, WWW'15 - Date: May 2015

Author(s): Alina Hang, Alexander De Luca, Heinrich Hussmann
Publication: Proceedings of the 2015 SIGCHI Conference on Human Factors in Computing Systems (CHI '15) - Date: April 18 2015

Author(s): Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
Publication: - Date: January 2015

Author(s): Connor C. Hoover
Publication: Thesis - Date: 2015

Author(s): Hussain Alsaiari, M. Papadaki, P. S. Dowland, Steven Furnell
Publication: Information Security Journal: A Global Perspective, Volume 24, Issue 4-6 - Date: 2015

Author(s): Ding Wang, Haibo Cheng, Qianchen Gu, Ping Wang
Publication: - Date: 2015

Author(s): Peter Mayer, Melanie Volkamer, Michaela Kauer
Publication: Information Systems Security: 10th International Conference, ICISS 2014, Lecture Notes in Computer Science, Volume 8880 - Date: December 16 2014

Author(s): Elaine Wooton
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Kemal Bicakci, Tashtanbek Satiev
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Author(s): Alec Muffett
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Author(s): Peter N. M. Hansteen
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Christine Ziske, Ulf Ziske
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Alec Muffett, Andrei Bajenov
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): David Jaeger, Hendrik Graupner, Andrey Sapegin, Feng Cheng, Christoph Meinel
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Author(s): Jens Steube
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Benjamin Delpy
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Markus Dürmuth, Thorsten Kranz
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Author(s): Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Author(s): Mats Sandvoll, Colin Boyd, Bjørn B. Larsen
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Author(s): Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser
Publication: The 8th International Conference on Passwords (Passwords14) / Lecture Notes in Computer Science Volume 9393 - Date: December 2014

Author(s): Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Amrit Kumar, Cédric Lauradoux
Publication: The 8th International Conference on Passwords (Passwords14) / Lecture Notes in Computer Science Volume 9393 - Date: December 2014

Author(s): Jonathan Millican, Frank Stajano
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Author(s): Huiping Sun, Shuaiying Guo, Ke Wang, Nan Qin, Zhong Chen
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Simon Josefsson
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Norbert Tihanyi, Attila Kovács, Gergely Vargha, Ádám Lénárt
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Author(s): Dominique Bongard
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Author(s): Dinei Florencio, Cormac Herley, P.C. van Oorschot
Publication: Proceedings of the 28th USENIX conference on Large Installation System Administration, LISA’14 - Date: November 2014

Author(s): Gamze Canova, Melanie Volkamer, Simon Weiler
Publication: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14) - Date: November 3 2014

Author(s): Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano
Publication: Cambridge International Workshop on Security Protocols, Security Protocols 2014 / Lecture Notes in Computer Science Volume 8809 - Date: October 29 2014

Author(s): Christopher Lockett Bonk
Publication: Masters Thesis - Date: October 2014

Author(s): Md Tanvir Islam Aumi, Sven Kratz
Publication: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices & Services, MobileHCI '14 - Date: September 2014

Author(s): Alejandro Catala, Luis A. Leiva
Publication: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices & Services, MobileHCI '14 - Date: September 2014

Author(s): Benjamin Donnelly, Tim Tomes
Publication: DerbyCon 4 - Date: September 2014

Author(s): Zhigong Li, Weili Han, Wenyuan Xu
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Author(s): Tobias Fiebig, Janis Danisevskis, Marta Piekarska
Publication: 7th Workshop on Cyber Security Experimentation and Test, CSET '14 - Date: August 2014

Author(s): Dmitry Chastuhin, Alex Polyakov
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Katja Malvoni, Alexander Peslyak [Solar Designer], Josip Knezovic
Publication: 8th USENIX Workshop on Offensive Technologies, WOOT '14 - Date: August 2014

Author(s): Dan Cvrcek, Petr Svenda
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Dimitri Fousekis [rurapenthe]
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Marcio Almeida de Macedo, Bruno Gonçalves de Oliveira
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Steve Thomas
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Marco Preuss
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Jeffrey Goldberg
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Stephen Lombardo, Nick Parker
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Sean M. Segreti, Blase Ur
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Bruce K. Marshall
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Yiannis Chrysanthou
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Lance James
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Robert David Graham
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Stephen Lombardo, William Gray
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Jean-Philippe Aumasson
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Thomas Pornin
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): David Silver, Suman Jana, Dan Boneh, Eric Chen, Collin Jackson
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Author(s): Dinei Florencio, Cormac Herley, P.C. van Oorschot
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Author(s): Jarred White
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Rick Redman [Minga]
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Nate Power
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Phillippe Paquet, Jason Nehrboss
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Mark Stanislav
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Landon P. Cox, Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Author(s): Yuchen Zhou, David Evans
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Author(s): Matt Marx
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, Stuart Schechter
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Author(s): Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song
Publication: Proceedings of the 23rd USENIX Security Symposium - Date: August 2014

Author(s): Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell
Publication: 8th USENIX Workshop on Offensive Technologies, WOOT '14 - Date: August 2014

Author(s): Sam Crowther
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Michal Špacek
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Daniel Reich
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Joseph Bonneau, Stuart Schechter
Publication: Proceedings of the 23rd USENIX Security Symposium - Date: August 2014

Author(s): Alex Biryukov, Dmitry Khovratovich, Johann Grozschaedl
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Christian Rechberger
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Andreas Brauchli, Depeng Li
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Author(s): Marsh Ray, Greg Zaverucha
Publication: Passwords14 Las Vegas - Date: August 2014

Author(s): Daniel V. Bailey, Markus Dürmuth, Christof Paar
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Raghav V. Sampangi, Kirstie Hawkey
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Hussain Alsaiari, M. Papadaki, P. S. Dowland, Steven Furnell
Publication: Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014) - Date: July 2014

Author(s): Mike Just
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Heather Crawford
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Terrance E. Boult, R.C. Johnson, Walter J. Scheirer
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Nicky Robinson, Joseph Bonneau
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Primal Wijesekera, Ivan Cherapau, Ayumi Samarakoon, Konstantin Beznosov
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Malek Ben Salem, Jonathan Voris, Salvatore J. Stolfo
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Shing-hon Lau, Stephen Siena, Ashutosh Pandey, Sroaj Sosothikul, Lorrie Faith Cranor
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Pengqing Xie, Yong Guan
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Herbert J. Mattord, Yair Levy, Steven Furnell
Publication: Journal of Information Privacy and Security, Volume 10, Issue 2 - Date: July 2014

Author(s): Shuja Shahzada, Sonia Chiasson, Robert Biddle
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Ann-Marie Horcher
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Larry Koved, Bo Zhang
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Akane Ito, Yui Ohtaka, Yoshie Yamada, Manabu Okamoto
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Simon S. Woo, Jelena Mirkovic, Ron Artstein, Elsi Kaiser
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda Bashir, Konstantin Beznosov
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): John Chuang
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Ed Talbot, Sean Peisert, Matt Bishop
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Joseph Bonneau, Edward W. Felten, Prateek Mittal, Arvind Narayanan
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Suresh Chari, Pau-Chen Cheng, Larry Koved, Ian Molloy, Youngja Park
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Eric Klieme, Klaus-Peter Engelbrecht, Sebastian Möller
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Yang Wang
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Chandrasekhar Bhagavatula, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, Blase Ur
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Lujo Bauer, Cristian Bravo-Lillo, Elli Fragkaki, William Melicher, Michael Stroucken
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Michael Karlesky, Napa Sae-Bae, Katherine Isbister, Nasir Memon
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Author(s): Karen Renaud, Melanie Volkamer, Joseph Maguire
Publication: Second International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014) - Date: June 22 2014

Author(s): Bin B. Zhu, Jianxin Jeff Yan, Guanbo Bao, Maowei Yang, Ning Xu
Publication: IEEE Transactions on Information Forensics and Security, Vol 9, No 6 - Date: June 2014

Author(s): Nina Kolb, Steffen Bartsch, Melanie Volkamer, Joachim Vogt
Publication: 16th International Conference on Human-Computer Interaction (HCII 2014) - Date: June 2014

Author(s): Ulrich Burgbacher, Klaus Hinrichs
Publication: Proceedings of the 2014 SIGCHI Conference on Human Factors in Computing Systems, CHI '14 - Date: April 2014

Author(s): Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti
Publication: Proceedings of the 2014 SIGCHI Conference on Human Factors in Computing Systems, CHI '14 - Date: April 2014

Author(s): Alexander De Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard Ewald Slawik, Heinrich Hussmann
Publication: Proceedings of the 2014 SIGCHI Conference on Human Factors in Computing Systems, CHI '14 - Date: April 2014

Author(s): Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
Publication: Proceedings of the 2014 SIGCHI Conference on Human Factors in Computing Systems, CHI '14 - Date: April 2014

Author(s): Yee-Yin Choong, Mary Theofanos, Hung-Kung Liu
Publication: NISTIR 7991 - Date: March 2014

Author(s): Ahmad B. A. Hassanat
Publication: International Journal of Sciences: Basic and Applied Research, Vol 13, No 1 - Date: 2014

Author(s): André Liechti
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Author(s): Chris Warrington
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Author(s): Asbjørn Reglund Thorsen
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Author(s): Jeremiah Blocki, Manuel Blum, Anupam Datta
Publication: AsiaCrypt 2013 - Date: December 2013

Author(s): Jeremiah Blocki, Manuel Blum, Anupam Datta
Publication: Proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013 - Date: December 2013

Author(s): Per Thorsheim
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Author(s): Nicolas Oberli, Manoé Zwahlen
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Author(s): Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis
Publication: 20th ACM Conference on Computer and Communications Security, CCS 2013 - Date: December 2013

Author(s): Marco Preuss
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Author(s): Andrey Belenko
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Author(s): Jan Fredrik Leversund
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Author(s): Jeunese Payne
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Author(s): Jeremiah Blocki, Manuel Blum, Anupam Datta
Publication: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, AISec '13 - Date: November 2013

Author(s): Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz
Publication: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS '13 - Date: November 2013

Author(s): Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang
Publication: arXiv 1310.1540 - Date: October 2013

Author(s): Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
Publication: Proceedings of the 14th IFIP TC 13 International Conference, INTERACT 2013 - Date: September 2013

Author(s): Lianying Zhao, Mohammad Mannan
Publication: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW '13 - Date: September 2013

Author(s): Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle
Publication: Proceedings of the 2013 IEEE eCrime Researchers Summit (eCRS) - Date: September 2013

Author(s): Sean Peisert, Ed Talbot, Tom Kroeger
Publication: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW '13 - Date: September 2013

Author(s): Marios Belk, Christos Fidas, Panagiotis Germanakos, George Samaras
Publication: Proceedings of the 14th IFIP TC 13 International Conference, INTERACT 2013 - Date: September 2013

Author(s): Emanuel von Zezschwitz, Alexander De Luca, Heinrich Hussmann
Publication: Proceedings of the 14th IFIP TC 13 International Conference, INTERACT 2013 - Date: September 2013

Author(s): Anil Somayaji, David Mould, Carson Brown
Publication: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW '13 - Date: September 2013

Author(s): Alina Hang, Alexander De Luca, Katharina Frison, Emanuel von Zezschwitz, Massimo Tedesco, Marcel Kockmann
Publication: Proceedings of the 14th IFIP TC 13 International Conference, INTERACT 2013 - Date: September 2013

Author(s): Markus Dürmuth
Publication: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW '13 - Date: September 2013

Author(s): Ziming Zhao, Gail-Joon Ahn, Jeon-Jin Seo, Hongxin Hu
Publication: Proceedings of the 22nd USENIX Security Symposium, Security '13 - Date: August 2013

Author(s): Abe Singer, Warren Anderson
Publication: USENIX ;login:, Volume 38, Number 4 - Date: August 2013

Author(s): Bruce K. Marshall
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Jens Steube [atom]
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Adam Goodman
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason Hong, Ian Oakley
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Robert David Graham
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Rick Redman [Minga]
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Steve Werby
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Jeffrey Goldberg
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Florian Schaub, Marcel Walch, Bastian Könings, Michael Weber
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Tom Steele
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Michal Špacek
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Russell Edward Graves [Bitweasil]
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Nami Hidaka, Saki Naguchi, Manabu Okamoto
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Dimitri Fousekis [rurapenthe]
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Elizabeth Stobert, Robert Biddle
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Dirk Van Bruggen, Shu Liu, Mitch Kajzer, Aaron Striegel, Charles R. Crowell, John D'Arcy
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Jens Steube [atom]
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Josh Dustin
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Jeffrey Goldberg
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Madoka Hasegawa, Keita Takahashi, Shigeo Kato
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Peter Kacherginsky [iphelix]
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): David Weinstein, Andrey Belenko
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Jean-Philippe Aumasson
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Julie Thorpe, Brent MacRae, Amirali Salehi-Abari
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Steve Thomas
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Marco Preuss
Publication: Passwords13 Las Vegas - Date: July 2013

Author(s): Kyriakos Kafas, Nouf Aljaffan, Shujun Li
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Nathan Malkin, Shriram Krishnamurthi, David H. Laidlaw
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Author(s): Cormac Herley, Stuart Schechter
Publication: The Twelfth Workshop on the Economics of Information Security, WEIS 2013 - Date: June 2013

Author(s): Jeremiah Blocki, Saranga Komanduri, Ariel Procaccia, Or Sheffet
Publication: Proceedings of the 14th ACM Conference on Electronic Commerce, EC '13 - Date: June 2013

Author(s): Michael Lee, Alan Dunn, Jonathan Katz, Brent Waters, Emmett Witchel
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Author(s): Ewa Syta, Bryan Ford
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Author(s): Ari Juels, Ronald L. Rivest
Publication: - Date: May 2013

Author(s): Martin Boonk, Ronald Petrlic, Christoph Sorge
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Author(s): R.C. Johnson, Walter J. Scheirer, Terrance E. Boult
Publication: Proceedings of SPIE Volume 8712 - Date: May 2013

Author(s): Karen Renaud, Joseph Maguire
Publication: Proceedings of the European Information Security Multi-Conference, EISMC 2013 - Date: May 2013

Author(s): Takahiro Ishii, Atsushi Inoie, Manabu Okamoto
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Author(s): Blase Ur, Saranga Komanduri, Richard Shay, Stephanos Matsumoto, Lujo Bauer, Nicolas Christin
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Author(s): David Aspinall, Mike Just
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Author(s): Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Author(s): Alexander De Luca, Emanuel von Zezschwitz, Ngo Dieu Huong Nguyen, Max-Emanuel Maurer, Elisa Rubegni, Marcello Paolo Scipioni
Publication: Proceedings of the 2013 SIGCHI Conference on Human Factors in Computing Systems, CHI '13 - Date: April 2013

Author(s): Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Author(s): Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, Cormac Herley
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13 - Date: April 2013

Author(s): Sascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders, Matthew Smith
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Author(s): Manal Adham, Amir Azodi, Yvo Desmedt, Ioannis Karaolis
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Author(s): Tey Chee Meng, Payas Gupta, Debin Gao
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Author(s): John Chuang, Hamilton Nguyen, Charles Wang, Benjamin Johnson
Publication: 2013 Workshop on Useable Security, USEC '13 - Date: April 2013

Author(s): Jing Tian, Chengzhang Qu, Wenyuan Xu, Song Wang
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Author(s): Serge Egelman
Publication: Proceedings of the 2013 SIGCHI Conference on Human Factors in Computing Systems, CHI '13 - Date: April 2013

Author(s): Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong, Adrian Perrig
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Author(s): Martin Emms, Budi Arief, Nicholas Little, Aad van Moorsel
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Author(s): Tilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Author(s): Haruhiko Fujii, Yukio Tsuruoka
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Author(s): Lingjun Li, Xinxin Zhao, Guoliang Xue
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Author(s): Majid Arianezhad, Douglas Stebila, Behzad Mozaffari
Publication: Financial Cryptography and Data Security 2013 Workshops, Lecture Notes in Computer Science Volume 7862, - Date: April 2013

Author(s): Claude Castelluccia, Abdelberi Chaabane, Markus Dürmuth, Daniele Perito
Publication: arXiv:1304.6584v1 [cs.CR] - Date: April 2013

Author(s): Ashwini Rao, Birendra Jha, Gananand Kini
Publication: Proceedings of the Third ACM Conference On Data and Application Security and PrivacY, CODASPY '13 - Date: February 2013

Author(s): Christian Forler, Stefan Lucks, Jakob Wenzel
Publication: Cryptology ePrint Archive, Report 2013/525 - Date: 2013

Author(s): Karen Renaud, Lewis Mackenzie
Publication: Journal of Artificial Societies and Social Simulation, Volume 16, Number 3 - Date: 2013

Author(s): Nathan Malkin
Publication: Undergraduate Honors Thesis for Brown University - Date: 2013

Author(s): Steve Thomas
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis
Publication: 28th Annual Computer Security Applications Conference (ACSAC) - Date: December 2012

Author(s): Simon Marechal
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Martin Johns, Sebastian Lekies, Bastian Braun, Benjamin Flesch
Publication: 28th Annual Computer Security Applications Conference, ACSAC '12 - Date: December 2012

Author(s): Shari Trewin, Cal Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
Publication: 28th Annual Computer Security Applications Conference, ACSAC '12 - Date: December 2012

Author(s): Shiva Houshmand, Sudhir Aggarwal
Publication: 28th Annual Computer Security Applications Conference (ACSAC) - Date: December 2012

Author(s): Russell Edward Graves [Bitweasil]
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Jeremy Spilman
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Kirsi Helkala
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Gildas Avoine, Adrien Bourgeois, Xavier Carpent
Publication: - Date: December 2012

Author(s): Christophe Rosenberger
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Jens Steube
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Sebastien Raveau
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Norbert Schmitz
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Markus Dürmuth
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Yiorgis Gozadinos
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Paul Dunphy, Patrick Olivier
Publication: 28th Annual Computer Security Applications Conference (ACSAC) - Date: December 2012

Author(s): Jeremi M. Gosney
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Tore Larsen Orderløkken
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Denise Ranghetti Pilar, Antonio Jaeger, Carlos F. A. Gomes, Lilian Milnitsky Stein
Publication: PLoS One v7(12): e51067 - Date: December 2012

Author(s): Simon Marechal
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Colin Percival
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, P.C. van Oorschot
Publication: 28th Annual Computer Security Applications Conference (ACSAC) - Date: December 2012

Author(s): Per Thorsheim
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Simon Marechal, Alexander Peslyak [Solar Designer]
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Dmitry Sumin
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Audun Jøsang
Publication: Passwords^12 (Passwords12) - Date: December 2012

Author(s): Dinei Florencio, Cormac Herley
Publication: IEEE Journal of Security & Privacy, Volume 10, Issue 6 - Date: November 2012

Author(s): Lim Kah Seng, Norafida Ithnin, Hazinah Kutty Mammi
Publication: International Journal of Security and Its Applications, Volume 6, Number 4 - Date: October 2012

Author(s): John Steven
Publication: OWASP AppSec USA, 2012 - Date: October 2012

Author(s): Jiawei Yuan, Lu Shi, Shucheng Yu, Ming Li
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Author(s): Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, Krish Vitaldevaria
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Author(s): Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie Downs, Saranga Komanduri, Stuart Schechter, Manya Sleeper
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Author(s): Jan Camenisch, Anna Lysyanskaya, Gregory Neven
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Author(s): Kenrick Mock, Bogdan Hoanca, Justin Weaver, Mikal Milton
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Author(s): Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan Wallach, Dirk Balfanz
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Author(s): San-Tsai Sun, Konstantin Beznosov
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Author(s): Rafael Veras, Julie Thorpe, Christopher Collins
Publication: Proceedings of the 9th Annual International Symposium on Visualization for Cyber Security VizSec '12 - Date: October 2012

Author(s): Julie Thorpe, Amirali Salehi-Abari, Robert Burden
Publication: Proceedings of the 2012 Workshop on New Security Paradigms, NSPW '12 - Date: September 2012

Author(s): Joseph Maguire, Karen Renaud
Publication: Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, BCS-HCI '12 - Date: September 2012

Author(s): Aureliano Calvo, Ariel Futoransky, Carlos Sarraute
Publication: Anales del WSegI 2011 Workshop de Seguridad Informática - Date: August 2012

Author(s): Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek
Publication: Proceedings of the 21st USENIX Conference on Security Symposium, Security '12 - Date: August 2012

Author(s): George Argyros, Aggelos Kiayias
Publication: Proceedings of the 21st USENIX Conference on Security Symposium, Security '12 - Date: August 2012

Author(s): Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln
Publication: Proceedings of the 21st USENIX Security Symposium, Security '12 - Date: August 2012

Author(s): Stefano Ortolani, Bruno Crispo
Publication: Proceedings of the 7th USENIX Workshop on Hot Topics in Security, HotSec '12 - Date: August 2012

Author(s): Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan Wallach
Publication: Proceedings of the 21st USENIX Security Symposium - Date: August 2012

Author(s): Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos
Publication: Proceedings of the 21st USENIX Conference on Security Symposium, Security '12 - Date: August 2012

Author(s): Markus Jakobsson, Mayank Dhiman
Publication: Proceedings of the 7th USENIX Workshop on Hot Topics in Security, HotSec '12 - Date: August 2012

Author(s): Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Tim Vidas
Publication: Proceedings of the Symposium On Usable Privacy and Security, SOUPS '12 - Date: July 2012

Author(s): Marek Klonowski, Krzysztof Majcher, Wojciech Macyna, Filip Zagorski
Publication: Proceedings of the Workshop on RFID Security - RFIDSec'12, Lecture Notes in Computer Science - Date: June 2012

Author(s): Rene Mayrhofer, Thomas Kaiser
Publication: Proceedings of the Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, IWSSISPMU 2012 - Date: June 2012

Author(s): Ivan Švogor, Tonimir Kišasondi
Publication: Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces (ITI) - Date: June 2012

Author(s): Luigi Sportiello
Publication: Proceedings of the Workshop on RFID Security - RFIDSec'12, Lecture Notes in Computer Science - Date: June 2012

Author(s): Gildas Avoine, Xavier Carpent
Publication: Proceedings of the Workshop on RFID Security - RFIDSec'12, Lecture Notes in Computer Science - Date: June 2012

Author(s): Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Christin
Publication: 2012 IEEE Symposium on Security and Privacy - Date: May 2012

Author(s): Andreas Bulling, Florian Alt, Albrecht Schmidt
Publication: Proceedings of the 2012 SIGCHI Conference on Human Factors in Computing Systems, CHI '12 - Date: May 2012

Author(s): Joseph Bonneau, Cormac Herley, P.C. van Oorschot, Frank Stajano
Publication: 2012 IEEE Symposium on Security and Privacy - Date: May 2012

Author(s): Joseph Bonneau
Publication: 2012 IEEE Symposium on Security and Privacy - Date: May 2012

Author(s): Andrew A. Adams, Shirley A. Williams
Publication: SIGCAS Computers and Society, Volume 44, Number 1 - Date: May 2012

Author(s): Lu Shi, Ming Li, Shucheng Yu, Jiawei Yuan
Publication: ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12 - Date: April 2012

Author(s): David Malone, Kevin Maher
Publication: Proceedings of the 21st international conference on World Wide Web, WWW '12 - Date: April 2012

Author(s): Jonathan Anderson, Robert N. M. Watson
Publication: Twentieth International Workshop on Security Protocols (SPW) - Date: April 2012

Author(s): Joseph Bonneau, Ekaterina Shutova
Publication: Workshop on Usable Security USEC '12 - Date: March 2012

Author(s): Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma, Suryakanth V. Gangashetty
Publication: International Journal of Network Security and Its Applications (IJNSA), Volume 4, Number 2 - Date: March 2012

Author(s): Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, P.C. van Oorschot
Publication: Journal of IEEE Transactions on Dependable and Secure Computing, Vol 9, Issue 2 - Date: March 2012

Author(s): Gildas Avoine, Xavier Carpent, Benjamin Martin
Publication: Journal of Network and Computer Applications, Volume 35, Number 2 - Date: March 2012

Author(s): Alexei Czeskis, Dirk Balfanz
Publication: Workshop on Usable Security USEC '12 - Date: March 2012

Author(s): Cormac Herley, P.C. van Oorschot
Publication: IEEE Security & Privacy, Vol. 10, No. 1 - Date: January 2012

Author(s): Hsien-Cheng Chou, Hung-Chang Lee, Chih-Wen Hsueh, Fei-Pei Lai
Publication: International Journal of Innovative Computing, Information and Control, Volume 8, Number 1(A) - Date: January 2012

Author(s): Kirsi Helkala, Nils Kalstad Svendsen, Per Thorsheim, Anders Wiehe
Publication: Proceedings of the 17th Nordic Conference on Information Security Technology for Applications NordSec '12, Lecture Notes in Computer Science, Volume 7617 - Date: 2012

Author(s): Robert Biddle, Sonia Chiasson, P.C. van Oorschot
Publication: ACM Computing Surveys, Volume 44, Number 4 - Date: 2012

Author(s): Kirsi Helkala, Nils Kalstad Svendsen
Publication: Proceedings of the 16th Nordic Conference on Information Security Technology for Applications NordSec '11 - Date: 2012

Author(s): William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, William T. Polk, Sarbari Gupta
Publication: NIST Special Publication 800-63-1 - Date: December 12 2011

Author(s): P.C. van Oorschot, Julie Thorpe
Publication: Journal of Computer Security, Volume 19, Number 4 - Date: December 2011

Author(s): Mohammad Mannan, P.C. van Oorschot
Publication: Journal of Computer Security, Vol. 19, No. 4 - Date: December 2011

Author(s): Kevin Curran, Jonathan Doherty, Ayleen McCann, Gary Turkington
Publication: The EDP Audit, Control and Security Newsletter, Volume 44, Issue 5 - Date: November 2011

Author(s): Michael K. Gardner, Robert D. Hill, Christopher A. Was
Publication: PLoS One v6(10): e25428 - Date: October 2011

Author(s): Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu
Publication: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11 - Date: October 2011

Author(s): Kemal Bicakci, P.C. van Oorschot
Publication: Proceedings of the 2011 Workshop on New Security Paradigms NSPW '11 - Date: September 2011

Author(s): Nur Haryani Zakaria, David Griffiths, Sacha Brostoff, Jianxin Jeff Yan
Publication: Proceedings of the Seventh Symposium On Usable Privacy and Security, SOUPS '11 - Date: July 2011

Author(s): Chunhua Chen, Chris J. Mitchell, Shaohua Tang
Publication: Mobile Networks and Applications - Date: July 2011

Author(s): Per Thorsheim
Publication: Passwords^11 (Passwords11) - Date: June 2011

Author(s): Andrey Malyshev, Dmitry Skylarov
Publication: Passwords^11 (Passwords11) - Date: June 2011

Author(s): Markus Jakobsson, Ruj Akavipat
Publication: Passwords^11 (Passwords11) - Date: June 2011

Author(s): James Nobis
Publication: Passwords^11 (Passwords11) - Date: June 2011

Author(s): Simon Josefsson
Publication: Passwords^11 (Passwords11) - Date: June 2011

Author(s): Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Serge Egelman
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11 - Date: May 2011

Author(s): Kirsi Helkala
Publication: Journal of Computers, Volume 6, Number 5 - Date: May 2011

Author(s): Robert W. Reeder, Stuart Schechter
Publication: Journal of IEEE Security and Privacy, Volume 9, Issue 2 - Date: March 2011

Author(s): Ambarish Karole, Nitesh Saxena, Nicolas Christin
Publication: Lecture Notes in Computer Science, Volume 6829 - Date: 2011

Author(s): Quan-a Jin, Da-Wu-a Gu, Jian-Jie-b Zhao
Publication: Journal of Shanghai Jiaotong University, Volume 45, Number 07 - Date: 2011

Author(s): Frank Stajano
Publication: Proceedings of the 19th international conference on Security Protocols (SP'11) - Date: 3 2011

Author(s): Meltem Sönmez Turan, Elaine Barker, William E. Burr, Lily Chen
Publication: NIST Special Publication 800-132 - Date: December 2010

Author(s): Howard Smith
Publication: Passwordscon 2010 (Passwords10) - Date: December 2010

Author(s): Emil Stefanov, Mikhail Atallah
Publication: Proceedings of the 2010 ACM workshop on Insider Threats, Insider Threats '10) - Date: October 2010

Author(s): Suganya G., Karpgavalli S., Christina V.
Publication: International Journal of Computer Applications, Volume 7, Number 14 - Date: October 2010

Author(s): Matt Weir, Sudhir Aggarwal, Michael Collins, Henry Stern
Publication: Proceedings of the 17th ACM conference on Computer and Communications Security CCS'10 - Date: October 2010

Author(s): Yinqian Zhang, Fabian Monrose, Michael K. Reiter
Publication: Proceedings of the 17th ACM conference on Computer and Communications Security CCS '10 - Date: October 2010

Author(s): San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov
Publication: Proceedings of the 2010 Workshop on New Security Paradigms NSPW '10 - Date: September 2010

Author(s): Simon Parkin, Aad van Moorsel, Philip G. Inglesant, Martina Angela Sasse
Publication: Proceedings of the 2010 Workshop on New Security Paradigms NSPW '10 - Date: September 2010

Author(s): Wanli Ma, John Campbell, Dat Tran, Dale Kleeman
Publication: 4th International Conference on Network and System Security, NSS 2010 - Date: September 1 2010

Author(s): P.C. van Oorschot, Amirali Salehi-Abari, Julie Thorpe
Publication: IEEE Transactions on Information Forensics and Security, Volume 5, Number 3 - Date: September 2010

Author(s): Mohamed Al-Fairuz, Karen Renaud
Publication: Information Security South Africa Conference 2010 - Date: August 2010

Author(s): Haichang Gao, Xiuling Chang, Zhongjie Ren, Uwe Aickelin, Liming Wang
Publication: Proceedings of the International Conference on Image Analysis and Recognition, ICIAR2010 / Lecture Notes in Computer Science, Volume 6112 - Date: June 2010

Author(s): Gildas Avoine, Xavier Carpent, Benjamin Martin
Publication: Proceedings of the Workshop on RFID Security - RFIDSec'10, Lecture Notes in Computer Science Volume 6370 - Date: June 2010

Author(s): Joseph Bonneau, Sören Preibusch
Publication: WEIS '10: The 9th Workshop on the Economics of Information Security - Date: June 2010

Author(s): Schalk Peach, Johannes Vorster, Renier van Heerden
Publication: Proceedings of the South African Information Security Multi-Conference - Date: May 2010

Author(s): A.W. Roscoe, Chen Bangdao, Long H. Nguyen
Publication: Proceedings of the Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, IWSSISPMU 2010 - Date: May 2010

Author(s): Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems, CHI '10 - Date: April 2010

Author(s): Philip G. Inglesant, Martina Angela Sasse
Publication: Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems, CHI '10 - Date: April 2010

Author(s): Karen Renaud, Mike Just
Publication: Proceedings of the 24th BCS Interaction Specialist Group Conference, BCS '10 - Date: 2010

Author(s): Stuart Schechter, Cormac Herley, Michael Mitzenmacher
Publication: Proceedings of the 5th USENIX conference on Hot topics in security, HotSec'10 - Date: 2010

Author(s): Joseph Bonneau, Mike Just, Greg Matthews
Publication: Proceedings of the Fourteenth International Conference on Financial Cryptography and Data Security 2010 - Date: 2010

Author(s): Karen Renaud, Antonella De Angeli
Publication: Communications of the ACM, Volume 52, Issue 12 - Date: December 2009

Author(s): Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy
Publication: 6th International Workshop on Visualization for Cyber Security, VizSec 2009 - Date: October 2009

Author(s): Karen Renaud, Joseph Maguire
Publication: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, BCS-HCI '09 - Date: September 2009

Author(s): Marcia Gibson, Karen Renaud, Marc Conrad, Carsten Maple
Publication: Proceedings of the 2009 Workshop on New Security Paradigms NSPW '09 - Date: September 2009

Author(s): Cormac Herley
Publication: Proceedings of the 2009 Workshop on New Security Paradigms NSPW '09 - Date: September 2009

Author(s): Ron Poet, Karen Renaud
Publication: International Journal of Pattern Recognition and Artificial Intelligence, Volume 23, Issue 05 - Date: August 2009

Author(s): Stuart Schechter, Robert W. Reeder
Publication: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09 - Date: July 2009

Author(s): Stuart Schechter, A. J. Bernheim Brush, Serge Egelman
Publication: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09 - Date: July 2009

Author(s): Mike Just, David Aspinall
Publication: Symposium on Usable Privacy and Security, SOUPS '09 - Date: July 2009

Author(s): Ann-Marie Horcher, Gurvirender P. Tejay
Publication: Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, ISI '09 - Date: June 2009

Author(s): Mike Just
Publication: Information Security Summit 2009 - Date: May 2009

Author(s): Matt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek
Publication: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP '09 - Date: May 2009

Author(s): Colin Percival
Publication: BSDCan 2009 - Date: May 2009

Author(s): Karen Scarfone, Murugiah Souppaya
Publication: NIST Special Publication 800-118 (Draft) - Date: April 2009

Author(s): Kostas Theoharoulis, Charalampos Manifavas, Ioannis Papaefstathiou
Publication: Proceedings of the 17th IEEE Symposium on Field Programmable Custom Computing Machines, FCCM '09 - Date: April 2009

Author(s): Stuart Schechter, Serge Egelman, Robert W. Reeder
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2009 - Date: April 2009

Author(s): Karen Renaud
Publication: Journal of Visual Languages & Computing, Volume 20, Issue 1 - Date: February 2009

Author(s): Amirali Salehi-Abari, Julie Thorpe, P.C. van Oorschot
Publication: Proceedings of the 24th Annual Computer Security Applications Conference ACSAC '08 - Date: December 2008

Author(s): Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Proceedings of the 2008 Conference on Future Play: Research, Play, Share, Future Play '08 - Date: November 2008

Author(s): Korey Johnson, Steffen Werner
Publication: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Volume 52, Number 6 - Date: September 2008

Author(s): Sonia Chiasson, Alain Forget, Robert Biddle, P.C. van Oorschot
Publication: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers 2008 - Date: September 2008

Author(s): Cormac Herley, Dinei Florencio
Publication: Proceedings of the 11th international conference on Information Security, ISC '08 - Date: September 2008

Author(s): Kirsi Helkala, Einar Snekkenes
Publication: Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008) - Date: July 2008

Author(s): Sonia Chiasson, Alain Forget, Robert Biddle
Publication: Symposium on Accessible Privacy and Security (SOAPS) 2008 - Date: July 2008

Author(s): Daniel LeBlanc, Sonia Chiasson, Alain Forget, Robert Biddle
Publication: Proceedings of the Symposium On Usable Privacy and Security, SOUPS '08 - Date: July 2008

Author(s): Alain Forget, Sonia Chiasson, P.C. van Oorschot, Robert Biddle
Publication: Proceedings of the 4th Symposium on Usable Privacy and Security SOUPS '08 - Date: July 2008

Author(s): Jeremy Clark, Urs Hengartner
Publication: The 3rd USENIX Workshop on Hot Topics in Security, HotSec '08 - Date: July 2008

Author(s): Karen Renaud, Anthony McBryan, Paul Siebert
Publication: IADIS Computer Graphics and Visualization, CGV 2008 - Date: July 2008

Author(s): Ariel Rabkin
Publication: Proceedings of the 4th Symposium On Usable Privacy and Security, SOUPS '08 - Date: July 2008

Author(s): Alain Forget, Sonia Chiasson, P.C. van Oorschot, Robert Biddle
Publication: Proceedings of the International Conference on Persuasive Technology (PT) 2008 - Date: June 2008

Author(s): Jim Owens, Jeanna Matthews
Publication: First USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '08 - Date: April 2008

Author(s): Michael Toomim, Xianhang Zhang, James Fogarty, James A. Landay
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '08 - Date: April 2008

Author(s): Sonia Chiasson, Jayakumar Srinivasan, Robert Biddle, P.C. van Oorschot
Publication: Proceedings of the 1st Conference on Usability, Psychology, and Security, UPSEC '08 - Date: April 2008

Author(s): Markus Jakobsson, Erik Stolterman, Susanne Wetzel, Liu Yang
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '08 - Date: April 2008

Author(s): Julie Thorpe
Publication: PhD Thesis for Carleton University - Date: January 2008

Author(s): John-Robert Skrabanek
Publication: Kentucky Law Journal, Volume 97, Number 4, 2008-2009 - Date: 2008

Author(s): Russell Edward Graves [Bitweasil]
Publication: Masters Thesis for Iowa State University - Date: 2008

Author(s): Alain Forget, Robert Biddle
Publication: Proceedings of Conference on Human Factors in Computing Systems (CHI) 2008 - Date: 2008

Author(s): Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig
Publication: Proceedings of the 4th Symposium On Usable Privacy and Security, SOUPS '08 - Date: 2008

Author(s): Paul Dunphy, Jianxin Jeff Yan
Publication: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07 - Date: October 2007

Author(s): Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Anti-Phishing Working Group (APWG) eCrime Researchers Summit 2007 - Date: October 2007

Author(s): Michael W. Brogan, Ching-Ping Lin, Rakesh Pai, Ira J. Kalet
Publication: Proceedings of the AMIA Annual Symposium 2007 - Date: October 2007

Author(s): Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007 - Date: October 15 2007

Author(s): Krzysztof Golofit
Publication: 2nd International Workshop on Secure Information Systems, SIS '07 - Date: October 2007

Author(s): Karen Renaud
Publication: Reliability Engineering & System Safety, Volume 92, Issue 9 - Date: September 2007

Author(s): Krzysztof Golofit
Publication: Lecture Notes in Computer Science, 2007, Volume 4734/2007 - Date: September 2007

Author(s): Sonia Chiasson, P.C. van Oorschot, Robert Biddle
Publication: Proceedings of ESORICS 2007 - Date: September 2007

Author(s): Julie Thorpe, P.C. van Oorschot
Publication: Proceedings of the 16th USENIX Security Symposium - Date: August 2007

Author(s): Sonia Chiasson, Robert Biddle, P.C. van Oorschot
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Author(s): Di Lin, Paul Dunphy, Patrick Olivier, Jianxin Jeff Yan
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Author(s): Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Symposium on Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Author(s): Paul Dunphy, Jianxin Jeff Yan
Publication: Proceedings of the 3rd Symposium On Usable Privacy and Security, SOUPS '07 - Date: July 2007

Author(s): Ahmet Emir Dirik, Nasir Memon, Jean-Camille Birget
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Author(s): Karen Renaud, Judith Ramsay
Publication: Behaviour & Information Technology, Volume 26, Issue 4 - Date: July 2007

Author(s): Rosa R. Heckle, Wayne G. Lutters
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Author(s): Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Author(s): Bruce K. Marshall
Publication: - Date: July 2007

Author(s): Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Author(s): Michael D. Leonhard, V. N. Venkatakrishnan
Publication: Proceedings of the IEEE Electro/Information Technology Conference (EIT) 2007 - Date: May 2007

Author(s): Dinei Florencio, Cormac Herley
Publication: Proceedings of the 16th international conference on the World Wide Web - Date: May 2007

Author(s): Druid
Publication: - Date: May 2007

Author(s): Sonia Chiasson, Robert Biddle
Publication: CHI 2007 Workshop on Security User Studies - Date: April 2007

Author(s): John Campbell, Dale Kleeman, Wanli Ma
Publication: Journal of Information Systems Security, Volume 16, Issue 1 - Date: January 2007

Author(s): Mark Keith, Benjamin Shao, Paul John Steinbart
Publication: International Journal of Human-Computer Studies, Vol 65, Issue 1 - Date: January 2007

Author(s): F. Asgharpour, Markus Jakobsson
Publication: Proceedings of the First International Workshop on Security for Spontaneous Interaction, IWIISI '07 - Date: 2007

Author(s): Xavier Boyen
Publication: Proceedngs of the 6th USENIX Security Symposium (SECURITY 2007) - Date: 2007

Author(s): Ann Nosseir, Richard Connor, Karen Renaud
Publication: Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments, OZCHI '06 - Date: November 2006

Author(s): John Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung
Publication: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS '06 - Date: October 2006

Author(s): Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri
Publication: IEEE Transaction on Dependable and Secure Computing, Vol 3(4) - Date: October 2006

Author(s): Sonia Chiasson, P.C. van Oorschot, Robert Biddle
Publication: Proceedings of the 15th USENIX Security Symposium (Security '06) - Date: July 2006

Author(s): Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor
Publication: Proceedings of the 2nd Symposium On Usable Privacy and Security, SOUPS '06 - Date: July 2006

Author(s): Shirley Gaw, Edward W. Felten
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2006 - Date: July 2006

Author(s): Volker Roth, Kai Richter
Publication: Journal of Banking and Finance, 30(6) - Date: June 2006

Author(s): Daphna Weinshall
Publication: Proceedings of the 2006 IEEE Symposium on Security and Privacy - Date: May 2006

Author(s): Shannon Riley
Publication: Usability News, Volume 8, Issue 1 - Date: February 2006

Author(s): Kenneth Allendoerfer, Shantanu Pai
Publication: Federal Aviation Administration Technical Report DOT/FAA/TC-06/09 - Date: January 2006

Author(s): Steven Furnell, Leith Zekri
Publication: Network Security, Volume 2006, Issue 1 - Date: January 2006

Author(s): Furkan Tari, A. Ant Ozok, Stephen H. Holden
Publication: Proceedings of the Second Symposium on Usable Privacy and Security, ACM International Conference Proceedings Series; Volume 149 - Date: 2006

Author(s): Deborah Sater Carstens, Linda C. Malone
Publication: Journal of Information, Information Technology, and Organizations, Volume 1 - Date: 2006

Author(s): Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel
Publication: International Conference on Information Systems Security, ICISS 2006 / Lecture Notes in Computer Science, Volume 4332 - Date: 2006

Author(s): Joseph A. Cazier, B. Dawn Medlin
Publication: Journal of Information Systems Security, Volume 15, Issue 6 - Date: 2006

Author(s): Mark Burnett
Publication: ISBN-13: 978-1597490412 - Date: December 2005

Author(s): Daniel R. L. Brown
Publication: Cryptology ePrint Archive: Report 2005/434 - Date: December 15 2005

Author(s): Arvind Narayanan, Vitaly Shmatikov
Publication: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS '05 - Date: November 2005

Author(s): Marco Antônio Carnut, Evandro Curvelo Hora
Publication: Proceedings of the 7th Symposium on Security in Informatics (7o Simpósio Segurança em Informática) - Date: November 2005

Author(s): Dirk Weirich
Publication: PhD Thesis for University College London - Date: October 2005

Author(s): Kenneth Allendoerfer, Shantanu Pai
Publication: Federal Aviation Administration Technical Report DOT/FAA/CT-05/20 - Date: September 2005

Author(s): Julie Thorpe, P.C. van Oorschot, Anil Somayaji
Publication: Proceedings of the 2005 Workshop on New Security Paradigms NSPW '05 - Date: September 2005

Author(s): K. Kotani, K. Horii
Publication: Behaviour & Information Technology, Volume 24, Number 4 - Date: July 2005

Author(s): Antonella De Angeli, Lynne Coventry, Graham Johnson, Karen Renaud
Publication: International Journal of Human-Computer Studies, Volume 63, Issues 1-2 - Date: July 2005

Author(s): Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir Memon
Publication: International Journal of Human-Computer Studies, Volume 63, Issues 1-2 - Date: July 2005

Author(s): Steven Furnell
Publication: Network Security, Volume 2005, Issue 3 - Date: March 2005

Author(s): J. Alex Halderman, Brent Waters, Edward W. Felten
Publication: International World Wide Web Conference Committee (IW3C2), WWW 2005 - Date: 2005

Author(s): Richard Roberts
Publication: Masters Thesis for the University of Liverpool, UK - Date: 2005

Author(s): Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
Publication: ECRYPT workshop Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS) - Date: 2005

Author(s): Mike Just
Publication: Security and Usability: Designing Secure Systems That People Can Use - Date: 2005

Author(s): Karen Renaud
Publication: Security and Usability: Designing Secure Systems That People Can Use - Date: 2005

Author(s): Virgil Griffith, Markus Jakobsson
Publication: Lecture Notes in Computer Science, Volume 3531 - Date: 2005

Author(s): Ant Allan, Clare Hirst, Jay Heiser, Avivah Litan
Publication: G00124965 - Date: December 17 2004

Author(s): Karen Renaud, Antonella De Angeli
Publication: Interacting with Computers, Volume 16, Issue 6 - Date: December 2004

Author(s): Ant Allan
Publication: Gartner G00124970 - Date: December 6 2004

Author(s): Julie Thorpe, P.C. van Oorschot
Publication: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC) - Date: December 2004

Author(s): Ross Anderson, Haowen Chan, Adrian Perrig
Publication: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP) - Date: October 2004

Author(s): Karen Renaud
Publication: Journal of Web Engineering, Volume 3, Number 2 - Date: October 2004

Author(s): Mike Just
Publication: IEEE Security & Privacy Journal, Volume 2, Number 5 - Date: September 2004

Author(s): Sacha Brostoff
Publication: PhD Thesis for University College London - Date: September 2004

Author(s): Martin Abadi, Cédric Fournet
Publication: Theoretical Computer Science, Volume 322, Number 3 - Date: September 2004

Author(s): Earl Perkins
Publication: META Group Practice, 2254 - Date: September 16 2004

Author(s): Alen Peacock, Xian KE, Matthew Wilkerson
Publication: IEEE Security & Privacy, Volume 2, Number 5 - Date: September 2004

Author(s): Julie Thorpe, P.C. van Oorschot
Publication: Proceedings of the 13th USENIX Security Symposium, Security '04 - Date: August 11 2004

Author(s): Adam Stubblefield, Dan Simon
Publication: MSR-TR-2004-85 - Date: August 2004

Author(s): Darren Davis, Fabian Monrose
Publication: Proceedings of the 13th USENIX Security Symposium, Security '04 - Date: August 11 2004

Author(s): Luiz H. R. Sucupira Jr., Livia C. F. Araujo, Miguel G. Lizarraga, Lee L. Ling
Publication: Proceedings of the First International Conference on Biometric Authentication, ICBA 2004 - Date: July 2004

Author(s): Miguel G. Lizarraga, Lee L. Ling
Publication: Proceedings of the First International Conference on Biometric Authentication, ICBA 2004 - Date: July 2004

Author(s): Livia C. F. Araujo, Luiz H. R. Sucupira Jr., Miguel G. Lizarraga, Lee L. Ling, Joao B. T. Yabu-uti
Publication: Proceedings of the First International Conference on Biometric Authentication, ICBA 2004 - Date: July 2004

Author(s): Alan S. Brown, Elisabeth Bracken, Sandy Zoccoli, King Douglas
Publication: Applied Cognitive Psychology, Volume 18, Issue 6 - Date: June 15 2004

Author(s): Marie Sandstrom
Publication: - Date: June 10 2004

Author(s): Earl Perkins
Publication: META Group Delta, 2978 - Date: June 29 2004

Author(s): Deholo Nali, Julie Thorpe
Publication: TR-04-01 - Date: May 27 2004

Author(s): Earl Perkins
Publication: META Group Delta, 2920 - Date: May 20 2004

Author(s): Betty J. Brown, Ken Callis
Publication: - Date: April 25 2004

Author(s): Daphna Weinshall, Scott Kirkpatrick
Publication: Proceedings of the Conference on Computer Human Interaction (CHI) 2004 - Date: April 2004

Author(s): Blake Ives, Kenneth R. Walsh, Helmut Schneider
Publication: Communications of the ACM, Volume 47, Issue 4 - Date: April 2004

Author(s): Lawrence O'Gorman, Amit Bagga, Jon Bentley
Publication: Proceedings of Financial Cryptography 04 - Date: February 2004

Author(s): Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
Publication: Proceedings of the 31st ACM Symposium on Principles of Programming Languages, POPL '04 - Date: January 2004

Author(s): Ryan Lim
Publication: - Date: January 22 2004

Author(s): Art Conklin, Glenn Dietrich, Diane Walz
Publication: Proceedings of the 37th Hawaii International Conference on System Sciences 2004 - Date: January 2004

Author(s): Steven Furnell, I. Papadopoulos, P. S. Dowland
Publication: Information Management and Computer Security, Volume 12, Number 2 - Date: 2004

Author(s): Volker Roth, Kai Richter, Rene Freidinger
Publication: Proceedings of the 11th ACM Conference on Computer and Communications Security - Date: 2004

Author(s): Deborah Sater Carstens, Pamela R. McCauley-Bell, Linda C. Malone, Ronald F. DeMara
Publication: Informing Science Journal, Volume 7 - Date: 2004

Author(s): Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
Publication: The Journal of Systems and Software, Number 71 - Date: 2004

Author(s): Merrill Warkentin, Kimberly Davis, Ernst Bekkering
Publication: Journal of Organizational and End User Computing, Volume 16, Number 3 - Date: 2004

Author(s): Wayne C. Summers, Edward Bosworth
Publication: Proceedings of the Winter International Symposium on Information and Communication Technologies - Date: 2004

Author(s): Daphna Weinshall
Publication: Technical Report 2004-30 - Date: 2004

Author(s): Lawrence O'Gorman
Publication: Proceedings of the IEEE, Volume 91, Issue 12 - Date: December 2003

Author(s): Lucy Jin, Xian Ke, Ryan Manuel, Matthew Wilkerson
Publication: MIT 6.857 Computer and Network Security course - Date: December 2003

Author(s): Kim-Phuong L. Vu, Abhilasha Bhargav, Robert W. Proctor
Publication: Proceedings of the 47th annual meeting of the Human Factors and Ergonomics Society, Volume 47, Number 11 - Date: October 2003

Author(s): Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi
Publication: Proceedings of the 2003 Workshop on New Security Paradigms NSPW '03 - Date: September 2003

Author(s): Tom Perrine, Devin Kowatch
Publication: - Date: September 2003

Author(s): Jim Liddell, Karen Renaud, Antonella De Angeli
Publication: 17th Annual Human Computer Interaction Conference, HCI 2003 - Date: September 2003

Author(s): Philippe Oechslin
Publication: Proceedings of Advances in Cryptology, Crypto '03 - Lecture Notes in Computer Science, Volume 2729 - Date: August 2003

Author(s): Cheng-Chi Lee, Min-Shiang Hwang, Li-Hua Li
Publication: Applied Mathematics and Computation, Volume 139, Issue 2-3 - Date: July 2003

Author(s): Eric Ogren
Publication: - Date: June 17 2003

Author(s): Jim Hurley
Publication: Ask the Analysts - Date: May 1 2003

Author(s): Alan H. Karp
Publication: Technical Report HPL-2002-39 (R.1) - Date: May 6 2003

Author(s): Sacha Brostoff, Martina Angela Sasse
Publication: Proceedings of CHI 2003, Workshop on Human-Computer Interaction and Security Systems - Date: April 2003

Author(s): Nathanael Paul, David Evans, Aviel D. Rubin, Dan Wallach
Publication: Proceedings of CHI 2003, Workshop on Human-Computer Interaction and Security Systems - Date: April 2003

Author(s): Mike Just
Publication: Proceedings of CHI 2003, Workshop on Human-Computer Interaction and Security Systems - Date: April 2003

Author(s): Lynne Coventry, Antonella De Angeli, Graham Johnson
Publication: Proceedings of CHI 2003, Workshop on Human-Computer Interaction and Security Systems - Date: April 2003

Author(s): Author(s) Unknown
Publication: - Date: March 2003

Author(s): Mike Bond, Piotr Zielinski
Publication: University of Cambridge Technical Report #560 - Date: February 2003

Author(s): Chris King
Publication: META Group Client Advisor, 705 - Date: January 20 2003

Author(s): Benny Pinkas, Tomas Sander
Publication: Proceedings of the 9th ACM Conference on Computer and Communications Security - Date: November 2002

Author(s): John Michael Williams
Publication: Proceedings of the 2002 Workshop on New Security Paradigms NSPW '02 - Date: September 2002

Author(s): Robert W. Proctor, Mei-Ching Lien, Kim-Phuong L. Vu, E. Eugene Schultz, Jr., Gavriel Salvendy
Publication: Behavior Research Methods, Instruments & Computers, 34 - Date: May 2002

Author(s): Earl Perkins
Publication: META Group Delta, 969 - Date: February 19 2002

Author(s): Fabian Monrose, Michael K. Reiter, Susanne Wetzel
Publication: International Journal on Information Security, Volume 1, Number 2 - Date: February 2002

Author(s): Christoph Steigner, Jürgen Wilke
Publication: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002) - Date: January 2002

Author(s): Joseph Bonneau, Sören Preibusch, Ross Anderson
Publication: FC '12: The 16th International Conference on Financial Cryptography - Date: 2002

Author(s): Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
Publication: Lecture Notes in Computer Science, Number 2437 - Date: 2002

Author(s): I. Irakleous, Steven Furnell, P. S. Dowland, M. Papadaki
Publication: Information Management and Computer Security, Volume 10, Number 3 - Date: 2002

Author(s): Edward F. Gehringer
Publication: 2002 International Symposium on Technology and Society, ISTAS '02 - Date: 2002

Author(s): John Girard
Publication: Gartner T-14-9809 - Date: December 13 2001

Author(s): Richard E. Smith
Publication: ISBN-13: 978-0201615999 - Date: October 2001

Author(s): Jianxin Jeff Yan
Publication: ACM New Security Paradigms Workshop - Date: September 2001

Author(s): Kanta Matsuura
Publication: Proceedings of the 2001 International Workshop on Cryptology and Network Security - Date: September 2001

Author(s): Karen Renaud, Elme Smith
Publication: Annual Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT '01 - Date: September 2001

Author(s): Dirk Weirich, Martina Angela Sasse
Publication: Proceedings of the New Security Paradigms Workshop 2001 - Date: September 2001

Author(s): Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster
Publication: Proceedings of the USENIX Security Symposium - Date: August 2001

Author(s): Martina Angela Sasse, Sacha Brostoff, Dirk Weirich
Publication: BT Technology Journal, Volume 19, Issue 3 - Date: July 2001

Author(s): Dirk Weirich, Martina Angela Sasse
Publication: CHI 2001 - Date: April 2001

Author(s): Kristen Noakes-Fry, Ant Allan
Publication: Gartner TU-12-9616 - Date: February 6 2001

Author(s): Simon Liu, Mark Silverman
Publication: IT Professional, Volume 3, Number 1 - Date: January 2001

Author(s): Roberta J. Witty
Publication: Gartner QA-12-8664 - Date: January 30 2001

Author(s): Niklas Frykholm, Ari Juels
Publication: Proceedings of the ACM Conference on Computer and Communication Security (CCS '01) - Date: 2001

Author(s): Khaled El Emam, Katherine Moreau, Elizabeth Jonker
Publication: Journal of Medical Internet Research 2011;13(1):e18 - Date: 2001

Author(s): John O. Pliam
Publication: First International Conference in Cryptology in India, INDOCRYPT 2000 - Date: December 2000

Author(s): Chris Christiansen, Nora S. Freedman, Brian Burke, Charles Kolodgy
Publication: IDC Bulletin #23270 - Date: November 2000

Author(s): Rachael Pond, John Podd, Julie Bunnell, Ron Henderson
Publication: Computers and Security, Volume 19, Number 7 - Date: November 2000

Author(s): Jim Alves-Foss
Publication: 23rd National Information Systems Security Conference - Date: October 2000

Author(s): Jason Hong, Hesham Kamel, John Kodumal, Francis Li, James Lin
Publication: Survey Project Requirement for IS 271, University of California Berkeley - Date: October 11 2000

Author(s): Taekyoung Kwon, Jooseok Song
Publication: IEICE TRANSACTIONS on Communications Vol.E83-B No.9 - Date: September 20 2000

Author(s): Sacha Brostoff, Martina Angela Sasse
Publication: Proceedings of CHI 2000, People and Computers XIV - Date: September 2000

Author(s): Jianxin Jeff Yan, Alan Blackwell, Ross Anderson, Alasdair Grant
Publication: University of Cambridge Technical Report, UCAM-CL-TR-500 - Date: September 2000

Author(s): Shaohua Tang
Publication: Journal of Circuits, Systems, and Computers, Volume 10, Number 3/4 - Date: June 2000

Author(s): Fabian Monrose, Aviel D. Rubin
Publication: Future Generation Computing Systems (FGCS) Journal: Security on the Web (special issue) - Date: March 2000

Author(s): Chris King
Publication: META Group Delta, 881 - Date: March 28 2000

Author(s): Carl Ellison, Chris Hall, Randy Milbert, Bruce Schneier
Publication: Journal of Future Generation Computer Systems, Volume 16, Number 4 - Date: 2000

Author(s): Anne Adams, Martina Angela Sasse
Publication: Communications of the ACM, Volume 42, Issue 12 - Date: December 1999

Author(s): Stephen H. Brackin
Publication: 22nd National Information Systems Security Conference - Date: October 1999

Author(s): Jim Alves-Foss
Publication: 22nd National Information Systems Security Conference - Date: October 1999

Author(s): Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang
Publication: Journal of Information Science and Engineering: Volume 15, Number 4 - Date: July 1999

Author(s): Ted Julian
Publication: The Forrester Report - Date: June 1999

Author(s): N. Provos, David Mazieres
Publication: Proceedings of the 1999 USENIX Annual Technical Conference - Date: June 1999

Author(s): Marlo Kosanovich
Publication: META Group Delta, 779 - Date: April 29 1999

Author(s): Anil K. Jain, Lin Hong, Y. Kulkarni
Publication: 2nd International Conference on Audio and Video-based Biometric Person Authentication - Date: March 1999

Author(s): Thomas Wu
Publication: Proceedings of the 1999 ISOC Symposium on Network and Distributed System Security - Date: February 1999

Author(s): Ari Juels, Martin Wattenberg
Publication: Proceedings of the 6th ACM Conference on Computer and Communications Security - Date: 1999

Author(s): Min-Shiang Hwang
Publication: International Journal of Computer Mathematics, Volume 70, Number 4 - Date: 1999

Author(s): Stuart Schechter, Todd Parnell, Alexander Hartemink
Publication: Proceedings of the Third International Conference on Financial Cryptography, FC '99 - Date: 1999

Author(s): Adrian Perrig, Dawn Song
Publication: Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99) - Date: 1999

Author(s): Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
Publication: ACM Transactions on Information and System Security (TISSEC), Volume 1, Issue 1 - Date: November 1998

Author(s): Akihiro Shimizu, Tsumotu Horioka, Hirohito Inagaki
Publication: IEICE Transactions on Communications: Volume E81-B, Number 8 - Date: August 1998

Author(s): Jong-Hyeon Lee
Publication: - Date: August 1998

Author(s): Tsumotu Horioka, Akihiro Shimizu
Publication: INET '98 Conference Proceedings - Date: July 1998

Author(s): Bruce K. Marshall
Publication: Black Hat USA 1998 - Date: July 1998

Author(s): Mihir Bellare, Ran Canetti, Hugo Krawczyk
Publication: Proceedings of the 30th Annual Symposium on the Theory of Computing / Eurocrypt 1998? - Date: 1998

Author(s): Willem G. de Ru, Jan H. P. Eloff
Publication: IEEE Expert: Intelligent Systems and Their Applications, Volume 12, Issue 6 - Date: November 1997

Author(s): Anne Adams, Martina Angela Sasse, Peter Lunt
Publication: People and Computers XII, Proceedings of HCI '97 - Date: August 1997

Author(s): Charles Cresson Wood
Publication: Information Management & Computer Security, Volume 5, Number 2/3 - Date: July 25 1997

Author(s): Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
Publication: Proceedings of the 4th ACM Conference on Computer and Communications Security, CCS '97 - Date: April 1997

Author(s): Julie Bunnell, John Podd, Ron Henderson, R. Napier, J. Kennedy-Moffat
Publication: Computers and Security, Volume 16, Number 7 - Date: 1997

Author(s): Kurt Hockenbury
Publication: - Date: 1997

Author(s): John Podd, Julie Bunnell, Ron Henderson
Publication: Proceedings of the 6th Australian Conference on Computer-Human Interaction (OZCHI '96) - Date: November 1996

Author(s): Kate Barrelle, William Laverty, Ron Henderson, Jon Gough, Michael Wagner, Michael Hiron
Publication: International Journal of Human-Computer Studies, Volume 45, Issue 1 - Date: July 1996

Author(s): Udi Manber
Publication: Computers and Security, Volume 15 Number 2 - Date: 1996

Author(s): Y. Harada, K. Kuroki
Publication: Reports of National Research Institute of Police Science, 37 - Date: 1996

Author(s): Charles Cresson Wood
Publication: Information Management & Computer Security, Volume 4, Number 1 - Date: 1996

Author(s): Aviel D. Rubin
Publication: USENIX Computing Systems Volume 9, Number 1 - Date: 1996

Author(s): Arnold Reinhold
Publication: - Date: July 28 1995

Author(s): Horng-Twu Liaw, Chin-Laung Lei
Publication: Cryptologia, Volume XIX, Number 2 - Date: April 1995

Author(s): Matt Bishop, Daniel V. Klein
Publication: Computers and Security, Volume 14, Number 3 - Date: 1995

Author(s): Chin-Chen Chang, Wen-Yuan Liao
Publication: Computers & Security, Volume 13, Number 2 - Date: April 1994

Author(s): Ravi Ganesan, Chris Davies
Publication: Proceedings of the 17th National Computer Security Conference - Date: 1994

Author(s): Yishay Spector, Jacob Ginzberg
Publication: Computers and Security, Volume 13, Number 2 - Date: 1994

Author(s): Unknown
Publication: Federal Information Processing Standards - Date: October 5 1993

Author(s): Moshe Zviran, William J. Haga
Publication: The Computer Journal, Volume 36, Number 3 - Date: June 1993

Author(s): B. Clifford Neuman, Stuart G. Stubblebine
Publication: Operating Systems Review: Volume 27, Number 2 - Date: April 1993

Author(s): Chris Davies, Ravi Ganesan
Publication: Proceedings of the National Computer Security Conference ’93, the 16th NIST/NSA conference - Date: 1993

Author(s): Butler W. Lampson, Martin Abadi, Michael Burrows, Edward Wobber
Publication: ACM Transactions on Computer Systems Volume 10, Number 4 - Date: November 1992

Author(s): Matt Bishop
Publication: Proceedings of the 3rd UNIX Security Symposium - Date: September 1992

Author(s): Eugene Spafford
Publication: Purdue Technical Report CSD-TR 92-049 - Date: July 31 1992

Author(s): Eugene Spafford
Publication: Computers & Security, Volume 11, Number 3 - Date: May 1992

Author(s): Tzong-Chen Wu, Chin-Chen Chang
Publication: International Journal of Computer Mathematics, Volume 41, Number 1-2 - Date: December 1991

Author(s): Matt Bishop
Publication: Proceedings of the 3rd Workshop on Computer Incident Handling - Date: August 1991

Author(s): Daniel V. Klein
Publication: Proceedings of the 14th DoE Computer Security Group - Date: May 1991

Author(s): Matt Bishop
Publication: Proceedings of the 7th International Conference on Information Security / PCS-TR90-152 - Date: May 1991

Author(s): William J. Haga, Moshe Zviran
Publication: Information Systems, Volume 16, Number 3 - Date: 1991

Author(s): Moshe Zviran, William J. Haga
Publication: Journal of Computing, Number 36? - Date: December 1990

Author(s): Moshe Zviran, William J. Haga
Publication: Proceedings of the 5th Jerusalem Conference on 'Next Decade in Information Technology' (Cat. No.90TH0326-9) - Date: October 1990

Author(s): Chin-Chen Chang, Ling-Hua Wu
Publication: Journal of Information Science and Engineering: Volume 6, Number 2 - Date: June 1990

Author(s): Li Gong, D. J. Wheeler
Publication: Journal of Cryptology: Volume 2, Number 2 - Date: 1990

Author(s): Michele D. Crabb
Publication: Proceedings of the Second USENIX UNIX Security Workshop - Date: 1990

Author(s): Michael Burrows, Martin Abadi, Roger M. Needham
Publication: Proceedings of the 12th ACM Symposium on Operating System Principles - Date: December 1989

Author(s): Khrosrow Dehnad
Publication: Computers and Security, Volume 8, Number 7 - Date: November 1989

Author(s): David L. Jobusch, Arthur E. Oldehoeft
Publication: Computers and Security, Volume 8, Number 7 - Date: November 1989

Author(s): David L. Jobusch, Arthur E. Oldehoeft
Publication: Computers and Security, Volume 8, Number 9 - Date: November 1989

Author(s): Don Seeley
Publication: Communications of the ACM, Volume 32, Issue 6 - Date: June 1989

Author(s): Michael Luby, Charles Rackoff
Publication: Journal of Cryptology Volume 1, Number 3 - Date: 1989

Author(s): William J. Haga, Moshe Zviran
Publication: Data Processing and Communications Security 3 - Date: 1989

Author(s): Bruce L. Riddle, Murray S. Miron, Judith A. Semo
Publication: Computers and Security, Volume 8, Number 7 - Date: 1989

Author(s): John B. Nagle
Publication: comp.sources.unix 16(60) - Date: November 1988

Author(s): Ana Marie De Alvare, E. Eugene Schultz, Jr.
Publication: UNIX Security Workshop Proceedings - Date: August 1988

Author(s): Michael Burrows, Martin Abadi, Roger M. Needham
Publication: University of Cambridge Technical Report #138 - Date: June 1988

Author(s): Belden Menkus
Publication: Computers and Security, Volume 7, Issue 2 - Date: April 1988

Author(s): S. L. Smith
Publication: Computers and Security, Number 6? - Date: 1987

Author(s): W. L. Price
Publication: Technical Report DITC 73/86 - Date: July 1986

Author(s): Andrew D. Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
Publication: Proceedings of the 1986 IEEE Symposium on Security and Privacy - Date: April 1986

Author(s): Fred Cohen
Publication: Information Age, Volume 7, Number 1 - Date: February 1985

Author(s): Kamaljit Singh
Publication: ACM SIGOPS Operating Systems Review, Volume 19, Issue 1 - Date: January 1985

Author(s): Ben F. Barton, Marthalee S. Barton
Publication: Computers & Security, Volume 3, Issue 3 - Date: 1984

Author(s): Sigmund N. Porter
Publication: Computers and Security, Volume 1, Number 1 - Date: January 1982

Author(s): Leslie Lamport
Publication: Communications of the ACM, Volume 24, Number 11 - Date: November 1981

Author(s): Robert Morris Sr., Ken Thompson
Publication: Communications of the ACM, Volume 22, Issue 11 - Date: November 1979

Author(s): Jason Gait
Publication: ACM SIGOPS Operating Systems Review, Volume 12, Number 3 - Date: July 1978

Author(s): Morrie Gasser
Publication: MTR-3006, ESD-TR-75-97, AD-A017676 - Date: November 1975

Author(s): George B. Purdy
Publication: Communications of the ACM, Volume 17, Number 8 - Date: August 1974

Author(s): Arthur Evans, Jr., William Kantrowitz, Edwin Weiss
Publication: Communications of the ACM, Volume 17 Issue 8 - Date: August 1974






[Home] [About Us] [News] [Research]

Copyright © 2016 PasswordResearch.com