Authentication Research Paper Index

A core objective of PasswordResearch.com is to improve awareness of existing authentication research. Many valuable insights into, and solutions for, the problems associated with authentication have gone unnoticed by the people responsible for authentication security.

This project is an ongoing effort to compile and share a comprehensive, but curated, index of password and authentication related research produced by academic, industry, and government experts. We share the details of useful research, provide links to free copies of the papers (when possible), and encourage collaboration between authors and other security professionals.

If you have an appropriate research paper or other resource to add, please send a copy of the material along with details on its source to siteupdates@passwordresearch.com.

Research Paper Index

Authors: Ivan De Oliveira Nunes, Karim Eldefrawy, Tancrède Lepoint
Publication: Future Generation Computer Systems, Volume 98 - Date: September 2019

Authors: Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth
Publication: 34th International Conference on ICT Systems Security and Privacy Protection (SEC 2019) - Date: June 2019

Authors: Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Emanuel von Zezschwitz, Matthew Smith
Publication: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19) - Date: May 4 2019

Authors: Richard Posso, Santiago Criollo-C
Publication: World Conference on Information Systems and Technologies (WorldCIST'19) - Date: April 16 2019

Authors: Merve Yildirim, Ian Mackie
Publication: International Journal of Information Security - Date: April 11 2019

Authors: Xiaoying Yu, Qi Liao
Publication: International Journal of Information Security - Date: April 12 2019

Authors: Simon S. Woo, Ron Artstein, Xiao Le, Jelena Mirkovic
Publication: ACM Transactions on Privacy and Security (TOPS), volume 22, Issue 2 - Date: April 2019

Authors: Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo
Publication: arXiv:1903.12340 [cs.CR] - Date: March 29 2019

Authors: Ilia Shumailov, Laurent Simon, Jeff Yan, Ross Anderson
Publication: arXiv:1903.11137 [cs.CR] - Date: March 26 2019

Authors: Noureddine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari
Publication: 33rd International Conference on Advanced Information Networking and Applications (AINA 2019) / Advances in Intelligent Systems and Computing, vol 926 - Date: March 27 2019

Authors: Yee-Yin Choong, Mary Theofanos, Karen Renaud, Suzanne Prior
Publication: Proceedings 2019 Workshop on Usable Security (USEC) - Date: February 24 2019

Authors: Ajit Gaddam
Publication: USENIX Enigma 2019 - Date: February 2019

Authors: Amine Kamel
Publication: AppSec California 2019 - Date: January 2019

Authors: Will Bengtson, Travis McPeak
Publication: AppSec California 2019 - Date: January 2019

Authors: Sibusiso Sishi
Publication: PasswordsCon 2018 Stockholm - Date: November 20 2018

Authors: Kelley Robinson
Publication: PasswordsCon 2018 Stockholm - Date: November 19 2018

Authors: Miranda Wei
Publication: PasswordsCon 2018 Stockholm - Date: November 19 2018

Authors: Ricky Mondello
Publication: PasswordsCon 2018 Stockholm - Date: November 20 2018

Authors: Cecilie Wian
Publication: PasswordsCon 2018 Stockholm - Date: November 19 2018

Authors: Vladimir Katalov
Publication: PasswordsCon 2018 Stockholm - Date: November 20 2018

Authors: Alme Santic, Camilla Lyngedal
Publication: PasswordsCon 2018 Stockholm - Date: November 20 2018

Authors: Carl Svensson
Publication: PasswordsCon 2018 Stockholm - Date: November 19 2018

Authors: Rob Yoder
Publication: PasswordsCon 2018 Stockholm - Date: November 19 2018

Authors: Moritz Horsch
Publication: PasswordsCon 2018 Stockholm - Date: November 19 2018

Authors: Suby Raman
Publication: PasswordsCon 2018 Stockholm - Date: November 20 2018

Authors: Fatma Al Maqbali, Chris J. Mitchell
Publication: Proceedings of the Future Technology Conference (FTC) 2018 - Date: November 13 2018

Authors: Christiaan Brand
Publication: PasswordsCon 2018 Stockholm - Date: November 19 2018

Authors: Jeffrey Goldberg
Publication: PasswordsCon 2018 Stockholm - Date: November 20 2018

Authors: Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa Redmiles
Publication: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18) - Date: October 15 2018

Authors: Fatma Al Maqbali, Chris J. Mitchell
Publication: 2018 International Carnahan Conference on Security Technology (ICCST) - Date: October 22 2018

Authors: Maximilian Golla, Markus Dürmuth
Publication: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18) - Date: October 2018

Authors: Sam Croley
Publication: BSidesLV 2018 - Date: August 8 2018

Authors: Leeren Chang
Publication: BSidesLV 2018 - Date: August 7 2018

Authors: Dustin Heywood
Publication: BSidesLV 2018 - Date: August 7 2018

Authors: Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Matthew Smith
Publication: Proceedings of the Fourteenth USENIX Symposium on Usable Privacy and Security (SOUPS '18) - Date: August 12 2018

Authors: Brad Girardeau
Publication: BSidesLV 2018 - Date: August 8 2018

Authors: Amir Shaked
Publication: BSidesLV 2018 - Date: August 7 2018

Authors: Dimitri Fousekis [rurapenthe]
Publication: BSidesLV 2018 - Date: August 8 2018

Authors: Kevin T. Neely
Publication: BSidesLV 2018 - Date: August 7 2018

Authors: Martin Vigo
Publication: BSidesLV 2018 - Date: August 8 2018

Authors: Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer
Publication: Proceedings of the 14th Symposium on Usable Privacy and Security (SOUPS 2018) - Date: August 12 2018

Authors: Randy Abrams, Briana Butler
Publication: BSidesLV 2018 - Date: August 7 2018

Authors: Miranda Wei, Maximilian Golla, Blase Ur
Publication: Who Are You?! Adventures in Authentication Workshop (WAY) - Date: August 12 2018

Authors: Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang
Publication: Network and Distributed Systems Security (NDSS) Symposium 2018 - Date: February 2018

Authors: Peter Mayer, Melanie Volkamer
Publication: Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST '17) - Date: December 5 2017

Authors: Peter Mayer, Alexandra Kunz, Melanie Volkamer
Publication: 2017 Annual Computer Security Applications Conference (ACSAC 33) - Date: December 7 2017

Authors: Fatma Al Maqbali, Chris J. Mitchell
Publication: 2017 International Carnahan Conference on Security Technology (ICCST) - Date: October 23 2017

Authors: Moritz Horsch, Johannes Braun, Johannes Buchmann
Publication: Open Identity Summit 2017 (OID2017) / Lecture Notes in Informatics (LNI) - Date: October 5 2017

Authors: Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith
Publication: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17) - Date: October 30 2017

Authors: Peter Mayer, Jan Kirchner, Melanie Volkamer
Publication: Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS 2017) - Date: July 12 2017

Authors: David M. Zendzian
Publication: BSidesLV 2017 - Date: July 26 2017

Authors: Evan Johnson
Publication: BSidesLV 2017 - Date: July 25 2017

Authors: Yael Basurto, Guillermo Buendia
Publication: BSidesLV 2017 - Date: July 26 2017

Authors: Ryan Castellucci, Marie Vasek
Publication: BSidesLV 2017 - Date: July 25 2017

Authors: Ryan Castellucci
Publication: BSidesLV 2017 - Date: July 25 2017

Authors: Royce Williams
Publication: BSidesLV 2017 - Date: July 26 2017

Authors: Mark Burnett
Publication: BSidesLV 2017 - Date: July 26 2017

Authors: Ross Dickey
Publication: BSidesLV 2017 - Date: July 26 2017

Authors: Arnold Reinhold
Publication: BSidesLV 2017 - Date: July 26 2017

Authors: Kyle Rankin
Publication: BSidesLV 2017 - Date: July 25 2017

Authors: Ian Foster, David Hulton
Publication: BSidesLV 2017 - Date: July 25 2017

Authors: Steve Thomas
Publication: BSidesLV 2017 - Date: July 26 2017

Authors: Moritz Horsch, Johannes Braun, Dominique Metz, Johannes Buchmann
Publication: Australasian Conference on Information Security and Privacy, ACISP 2017 / Lecture Notes in Computer Science, Vol 10343 - Date: July 3 2017

Authors: Paul A. Grassi, Michael E. Garcia, Jim Fenton
Publication: NIST Special Publication 800-63-3 - Date: June 2017

Authors: Paul A. Grassi, Jim Fenton, Elaine M. Newton, Ray A. Perlner, Andrew R. Regenscheid, William E. Burr
Publication: NIST Special Publication 800-63B - Date: June 2017

Authors: Paul A. Grassi, Jim Fenton, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene
Publication: NIST Special Publication 800-63A - Date: June 2017

Authors: Paul A. Grassi, Justin P. Richer, Sarah K. Squire, Jim Fenton, Ellen M. Nadeau, Naomi B. Lefkovitz
Publication: NIST Special Publication 800-63C - Date: June 2017

Authors: Hazel Murray, David Malone
Publication: 2017 28th Irish Signals and Systems Conference (ISSC) - Date: June 2017

Authors: Blase Ur, Felicia Alfieri, Maung Aung, Lujo Bauer, Nicolas Christin, Jessica Colnago
Publication: Proceedings of the 2017 SIGCHI Conference on Human Factors in Computing Systems (CHI '17) - Date: May 6 2017

Authors: Yomna Abdelrahman, Mohamed Khamis, Stefan Schneegass, Florian Alt
Publication: Proceedings of the 2017 SIGCHI Conference on Human Factors in Computing Systems (CHI '17) - Date: May 6 2017

Authors: Malin Eiband, Mohamed Khamis, Emanuel von Zezschwitz, Heinrich Hussmann, Florian Alt
Publication: Proceedings of the 2017 SIGCHI Conference on Human Factors in Computing Systems (CHI '17) - Date: May 6 2017

Authors: Ding Wang, Qianchen Gu, Xinyi Huang, Ping Wang
Publication: Proceedings of the 12th ACM ASIA Conference on Computer and Communications Security (ASIA CCS '17) - Date: April 2 2017

Authors: Johannes Kiesel, Benno Stein, Stefan Lucks
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Authors: Sovantharith Seng, Sadia Ahmed, Mahdi Nasrullah Al-Ameen, Matthew Wright
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Authors: Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patané, Marta Kwiatkowska, Ivan Martinovic
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Authors: Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Authors: Maximilian Golla, Dennis Detering, Markus Dürmuth
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Authors: Weitao Xu, Guohao Lan, Qi Lin, Sara Khalifa, Neil Bergmann, Mahbub Hassan
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Authors: S M Taiabul Haque, Mahdi Nasrullah Al-Ameen, Matthew Wright, Shannon Scielzo
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Authors: Hana Habib, Jessica Colnago, William Melicher, Blase Ur, Sean M. Segreti, Lujo Bauer
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Authors: Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt, Florian Alt
Publication: Proceedings of the 2017 Workshop on Usable Security (USEC '17) - Date: February 26 2017

Authors: Claude Castelluccia, Markus Dürmuth, Maximilian Golla, Fatma Deniz
Publication: Proceedings of the Network and Distributed System Security Symposium (NDSS’17) - Date: February 26 2017

Authors: Jeffrey Goldberg
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 7 2016

Authors: Khalid Mansour
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Authors: David Jaeger, Chris Pelchen, Hendrik Graupner, Feng Cheng, Christoph Meinel
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Authors: Emma Lilliestam
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Authors: David Llewellyn-Jones, Graham Rymer
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 7 2016

Authors: Peter Mayer, Hermann Berket, Melanie Volkamer
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Authors: Toshiyuki Masui
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Authors: Pierre-Antoine Haidar-Bachminska
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Authors: Simon S. Woo, Jelena Mirkovic
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Authors: Elizabeth Stobert, Irwin Reyes, Carrie Gates, Robert Biddle
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Authors: Adrian Dabrowski, Edgar Weippl
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Authors: Timo Kasper
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Authors: Emma Lilliestam
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 7 2016

Authors: Oleg Afonin
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 5 2016

Authors: Manuel Urueña, Ignacio Soto Campos
Publication: 11th International Conference on Passwords (Passwords16 Bochum) - Date: December 6 2016

Authors: Tony Arcieri
Publication: - Date: November 22 2016

Authors: Dinei Florencio, Cormac Herley
Publication: Communications of the ACM, Vol. 59 No. 11 - Date: November 2016

Authors: Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor
Publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) - Date: October 24 2016

Authors: Maximilian Golla, Benedict Beuscher, Markus Dürmuth
Publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) - Date: October 24 2016

Authors: Moritz Horsch, Mario Schlipf, Stefan Haas, Johannes Braun, Johannes Buchmann
Publication: Open Identity Summit 2016 (OID2016) / Lecture Notes in Informatics (LNI) - Proceedings, Volume P-264 - Date: October 13 2016

Authors: Peter Mayer, Stephan Neumann, Melanie Volkamer
Publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) - Date: October 24 2016

Authors: Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim
Publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) - Date: October 24 2016

Authors: Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang
Publication: Proceedings of the 23rd ACM Conference on Computer and Communications Security (ACM CCS 2016) - Date: October 24 2016

Authors: Weining Yang, Ninghui Li, Ian Molloy, Youngja Park, Suresh Chari
Publication: ESORICS 2016, Lecture Notes in Computer Science Volume 9878 - Date: September 26 2016

Authors: Yusuf Albayram, Mohammad Maifi Hasan Khan
Publication: Human-centric Computing and Information Sciences, Volume 6, Number 16 - Date: September 5 2016

Authors: Casey Cammilleri, Hans Lakhan
Publication: Derbycon 2016 - Date: September 23 2016

Authors: John V. Monaco, Charles C. Tappert
Publication: arXiv:1609.07612 - Date: September 24 2016

Authors: Ding Wang, Ping Wang
Publication: ESORICS 2016, Lecture Notes in Computer Science Volume 9878 - Date: September 26 2016

Authors: Fatma Al Maqbali, Chris J. Mitchell
Publication: The 10th WISTP International Conference on Information Security Theory and Practice (WISTP'2016) / Lecture Notes in Computer Science (LNCS, volume 9895) - Date: September 2016

Authors: Blase Ur
Publication: PhD Thesis CMU-ISR-16-110 - Date: September 2016

Authors: Sanjiv Kawa, Tom Porter
Publication: Passwords16 Las Vegas - Date: August 3 2016

Authors: Michal Špacek
Publication: Passwords16 Las Vegas - Date: August 3 2016

Authors: Evan Johnson
Publication: Passwords16 Las Vegas - Date: August 2 2016

Authors: Kirk Hayes
Publication: Passwords16 Las Vegas - Date: August 2 2016

Authors: Matt Weir
Publication: Passwords16 Las Vegas - Date: August 3 2016

Authors: Nick Sullivan
Publication: Passwords16 Las Vegas - Date: August 3 2016

Authors: Florencia Herra-Vega, Skylar Nagao
Publication: Passwords16 Las Vegas - Date: August 3 2016

Authors: Yair Yona, Suhas Diggavi
Publication: arXiv:1608.02132 - Date: August 2016

Authors: Bruce K. Marshall
Publication: Passwords16 Las Vegas - Date: August 3 2016

Authors: Arnold Reinhold
Publication: Passwords16 Las Vegas - Date: August 2 2016

Authors: Terry Gold
Publication: Passwords16 Las Vegas - Date: August 3 2016

Authors: Jim Fenton
Publication: Passwords16 Las Vegas - Date: August 2 2016

Authors: Jeffrey Goldberg, Julie Haugh
Publication: Passwords16 Las Vegas - Date: August 2 2016

Authors: Jean-Philippe Aumasson
Publication: Passwords16 Las Vegas - Date: August 2 2016

Authors: Mark Burnett
Publication: Passwords16 Las Vegas - Date: August 2 2016

Authors: Daniel Lowe Wheeler
Publication: Proceedings of the 25st USENIX Security Symposium (SEC'16) - Date: August 10 2016

Authors: Moritz Horsch, Mario Schlipf, Johannes Braun, Johannes Buchmann
Publication: Australasian Conference on Information Security and Privacy 2016, Lecture Notes in Computer Science volume 9722 - Date: July 4 2016

Authors: Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer
Publication: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) - Date: July 2016

Authors: Ding Wang, Debiao He, Haibo Cheng, Ping Wang
Publication: Proceedings of the 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016) - Date: June 2016

Authors: Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti
Publication: ACM Transactions on Information and System Security (TISSEC), Volume 18, Issue 4 - Date: May 2016

Authors: Rahul Chatterjee, Anish Athalye, Devdatta Akhawe, Ari Juels, Thomas Ristenpart
Publication: 37th IEEE Symposium on Security and Privacy - Date: May 2016

Authors: Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Phillip Rack
Publication: 31st International Conference on ICT Systems Security and Privacy Protection (SEC 2016) - Date: May 2016

Authors: Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang
Publication: Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (AISACCS 2016) - Date: May 2016

Authors: Suphannee Sivakorn, Iasonas (Jason) Polakis, Angelos D. Keromytis
Publication: Black Hat Asia 2016 - Date: March 2016

Authors: Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross Anderson, Nicholas Bohm, Alice Hutchings
Publication: Financial Cryptography and Data Security 2016 - Date: February 2016

Authors: Kai Cao, Anil K. Jain
Publication: MSU Technical Report MSU-CSE-16-2 - Date: February 19 2016

Authors: Nicolas Courtois, Guangyan Song, Ryan Castellucci
Publication: - Date: February 2016

Authors: Henry Corrigan-Gibbs, Dan Boneh, Stuart Schechter
Publication: - Date: January 2016

Authors: Xiaoying Yu, Qi Liao
Publication: Information and Computer Security, Vol 24, No 1 - Date: 2016

Authors: Michael Sprecher
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Maximilian Golla, Markus Dürmuth
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Maximilian Golla, Markus Dürmuth
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Authors: Simon Parkin, Samy Driss, Kat Krol, Martina Angela Sasse
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Authors: Sebastien Raveau
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Elena Agostini, Massimo Bernaschi
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Stefan Lucks, Jakob Wenzel
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Authors: Khandaker Abir Rahman, Ryan Moormann, Danielle Dierich, Md. Shafaeat Hossain
Publication: Communications in Computer and Information Science, Volume 566 - Date: December 2015

Authors: Jeunese Payne
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Dimitri Fousekis [rurapenthe]
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Igor Semaev
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Elizabeth Stobert, Robert Biddle
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Authors: Attaullah Buriro, Bruno Crispo, Filippo Del Frari, Jeffrey Klardie, Konrad Wrona
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Authors: Peder Sparell, Mikael Simovits
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Jean Lancrenon
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Authors: Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem Beyah
Publication: 2015 Annual Computer Security Applications Conference - Date: December 2015

Authors: Per Thorsheim
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Sonia Chiasson, P.C. van Oorschot
Publication: Designs, Codes and Cryptography, Volume 77, Issue 2 - Date: December 2015

Authors: Jeffrey Goldberg
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Peter Mayer, Melanie Volkamer
Publication: Proceedings of the 31st Annual Computer Security Applications Conference (ASAC 2015) - Date: December 7 2015

Authors: Martin Kleppmann, Conrad Irwin
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Authors: Chris Wysopal [Weld Pond]
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Martina Angela Sasse
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: Hossein Siadati, Toan Nguyen, Nasir Memon
Publication: 9th International Conference on Passwords (Passwords15 London) - Date: December 2015

Authors: AbdelRahman Abdou, David Barrera, P.C. van Oorschot
Publication: 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551 - Date: December 2015

Authors: Manuel Blum, Santosh Vempala
Publication: Third AAAI Conference on Human Computation and Crowdsourcing (HCOMP-15) - Date: November 2015

Authors: Matteo Dell'Amico, Maurizio Filippone
Publication: Proceedings of the 22nd ACM SIGSAC Conference on Computer & Communications Security, CCS '15 - Date: October 2015

Authors: Hao Fang, Hu Aiqun, Le Shi, Tao Li
Publication: 2015 International Conference on Wireless Communications & Signal Processing (WCSP) - Date: October 2015

Authors: Ding Wang, Ping Wang
Publication: Proc. Of the 20th European Symposium on Research in Computer Security, ESORICS 2015. Lecture Notes in Computer Science, Volume 9327 - Date: September 2015

Authors: Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem Beyah
Publication: IEEE Transactions on Dependable and Secure Computing, Volume PP, Issue 99 - Date: September 2015

Authors: Björn Pirrwitz
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Steve Thomas
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Jeremy Spilman
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Christian Heinrich, Daniel Cuthbert
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Ryan Castellucci
Publication: DEF CON 23 - Date: August 2015

Authors: Phillippe Paquet
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Bruce K. Marshall
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Michal Špacek
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri
Publication: Proceedings of the 24th USENIX Security Symposium, SEC'15 - Date: August 2015

Authors: Mark Burnett
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Moritz Horsch, Andreas Hülsing, Johannes Buchmann
Publication: Proceedings of the 2015 10th International Conference on Availability, Reliability and Security (ARES '15) - Date: August 24 2015

Authors: Drew Hintz
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Per Thorsheim
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Joseph Birr-Pixton
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Devin Egan
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Andrey Dulkin
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Cormac Herley
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Eduardo Novella
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Jim Fenton
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Greg Zaverucha
Publication: Passwords15 Las Vegas / MSR-TR-2015-63 - Date: August 2015

Authors: Marte Løge
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Sean M. Segreti, Blase Ur
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Jeffrey Goldberg
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Rick Redman [Minga], Dale Corpron
Publication: Passwords15 Las Vegas - Date: August 2015

Authors: Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer
Publication: Proceedings of the 11th Symposium on Usable Privacy and Security, SOUPS '15 - Date: July 2015

Authors: Joseph Bonneau, Cormac Herley, P.C. van Oorschot
Publication: Communications of the ACM, Vol. 58 No. 7 - Date: July 2015

Authors: Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
Publication: 36th IEEE Symposium on Security and Privacy - Date: May 2015

Authors: Joseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, Mike Williamson
Publication: Proceedings of the 24th international conference on World Wide Web, WWW'15 - Date: May 2015

Authors: Alina Hang, Alexander De Luca, Heinrich Hussmann
Publication: Proceedings of the 2015 SIGCHI Conference on Human Factors in Computing Systems (CHI '15) - Date: April 18 2015

Authors: Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
Publication: - Date: January 2015

Authors: Connor C. Hoover
Publication: Thesis - Date: 2015

Authors: Hussain Alsaiari, M. Papadaki, P. S. Dowland, Steven Furnell
Publication: Information Security Journal: A Global Perspective, Volume 24, Issue 4-6 - Date: 2015

Authors: Ding Wang, Haibo Cheng, Qianchen Gu, Ping Wang
Publication: - Date: 2015

Authors: Peter Mayer, Melanie Volkamer, Michaela Kauer
Publication: Information Systems Security: 10th International Conference, ICISS 2014, Lecture Notes in Computer Science, Volume 8880 - Date: December 16 2014

Authors: Elaine Wooton
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Kemal Bicakci, Tashtanbek Satiev
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Authors: Alec Muffett
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Authors: Peter N. M. Hansteen
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Christine Ziske, Ulf Ziske
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Alec Muffett, Andrei Bajenov
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: David Jaeger, Hendrik Graupner, Andrey Sapegin, Feng Cheng, Christoph Meinel
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Authors: Jens Steube
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Benjamin Delpy
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Markus Dürmuth, Thorsten Kranz
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Authors: Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Authors: Mats Sandvoll, Colin Boyd, Bjørn B. Larsen
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Authors: Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser
Publication: The 8th International Conference on Passwords (Passwords14) / Lecture Notes in Computer Science Volume 9393 - Date: December 2014

Authors: Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Amrit Kumar, Cédric Lauradoux
Publication: The 8th International Conference on Passwords (Passwords14) / Lecture Notes in Computer Science Volume 9393 - Date: December 2014

Authors: Jonathan Millican, Frank Stajano
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Authors: Huiping Sun, Shuaiying Guo, Ke Wang, Nan Qin, Zhong Chen
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Simon Josefsson
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Norbert Tihanyi, Attila Kovács, Gergely Vargha, Ádám Lénárt
Publication: 7th International Conference on Passwords (Passwords14 Trondheim). Lecture Notes in Computer Science, Volume 9393 - Date: December 2014

Authors: Dominique Bongard
Publication: 7th International Conference on Passwords (Passwords14 Trondheim) - Date: December 2014

Authors: Dinei Florencio, Cormac Herley, P.C. van Oorschot
Publication: Proceedings of the 28th USENIX conference on Large Installation System Administration, LISA’14 - Date: November 2014

Authors: Gamze Canova, Melanie Volkamer, Simon Weiler
Publication: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14) - Date: November 3 2014

Authors: Bin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang
Publication: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14) - Date: November 3 2014

Authors: Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano
Publication: Cambridge International Workshop on Security Protocols, Security Protocols 2014 / Lecture Notes in Computer Science Volume 8809 - Date: October 29 2014

Authors: Christopher Lockett Bonk
Publication: Masters Thesis - Date: October 2014

Authors: Md Tanvir Islam Aumi, Sven Kratz
Publication: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices & Services, MobileHCI '14 - Date: September 2014

Authors: Alejandro Catala, Luis A. Leiva
Publication: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices & Services, MobileHCI '14 - Date: September 2014

Authors: Benjamin Donnelly, Tim Tomes
Publication: DerbyCon 4 - Date: September 2014

Authors: Zhigong Li, Weili Han, Wenyuan Xu
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Authors: Tobias Fiebig, Janis Danisevskis, Marta Piekarska
Publication: 7th Workshop on Cyber Security Experimentation and Test, CSET '14 - Date: August 2014

Authors: Dmitry Chastuhin, Alex Polyakov
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Katja Malvoni, Alexander Peslyak [Solar Designer], Josip Knezovic
Publication: 8th USENIX Workshop on Offensive Technologies, WOOT '14 - Date: August 2014

Authors: Dan Cvrcek, Petr Svenda
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Dimitri Fousekis [rurapenthe]
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Marcio Almeida de Macedo, Bruno Gonçalves de Oliveira
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Steve Thomas
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Marco Preuss
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Jeffrey Goldberg
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Stephen Lombardo, Nick Parker
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Sean M. Segreti, Blase Ur
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Bruce K. Marshall
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Yiannis Chrysanthou
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Lance James
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Robert David Graham
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Stephen Lombardo, William Gray
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Jean-Philippe Aumasson
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Thomas Pornin
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: David Silver, Suman Jana, Dan Boneh, Eric Chen, Collin Jackson
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Authors: Dinei Florencio, Cormac Herley, P.C. van Oorschot
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Authors: Jarred White
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Rick Redman [Minga]
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Nate Power
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Phillippe Paquet, Jason Nehrboss
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Mark Stanislav
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Landon P. Cox, Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Authors: Yuchen Zhou, David Evans
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Authors: Matt Marx
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, Stuart Schechter
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Authors: Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song
Publication: Proceedings of the 23rd USENIX Security Symposium - Date: August 2014

Authors: Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell
Publication: 8th USENIX Workshop on Offensive Technologies, WOOT '14 - Date: August 2014

Authors: Sam Crowther
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Michal Špacek
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Daniel Reich
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Joseph Bonneau, Stuart Schechter
Publication: Proceedings of the 23rd USENIX Security Symposium - Date: August 2014

Authors: Alex Biryukov, Dmitry Khovratovich, Johann Grozschaedl
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Christian Rechberger
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Andreas Brauchli, Depeng Li
Publication: 23rd USENIX Security Symposium, SEC '14 - Date: August 2014

Authors: Marsh Ray, Greg Zaverucha
Publication: Passwords14 Las Vegas - Date: August 2014

Authors: Daniel V. Bailey, Markus Dürmuth, Christof Paar
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Raghav V. Sampangi, Kirstie Hawkey
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Hussain Alsaiari, M. Papadaki, P. S. Dowland, Steven Furnell
Publication: Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014) - Date: July 2014

Authors: Mike Just
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Heather Crawford
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Terrance E. Boult, R.C. Johnson, Walter J. Scheirer
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Nicky Robinson, Joseph Bonneau
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Primal Wijesekera, Ivan Cherapau, Ayumi Samarakoon, Konstantin Beznosov
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Malek Ben Salem, Jonathan Voris, Salvatore J. Stolfo
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Shing-hon Lau, Stephen Siena, Ashutosh Pandey, Sroaj Sosothikul, Lorrie Faith Cranor
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Pengqing Xie, Yong Guan
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Herbert J. Mattord, Yair Levy, Steven Furnell
Publication: Journal of Information Privacy and Security, Volume 10, Issue 2 - Date: July 2014

Authors: Shuja Shahzada, Sonia Chiasson, Robert Biddle
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Ann-Marie Horcher
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Larry Koved, Bo Zhang
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Akane Ito, Yui Ohtaka, Yoshie Yamada, Manabu Okamoto
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Simon S. Woo, Jelena Mirkovic, Ron Artstein, Elsi Kaiser
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda Bashir, Konstantin Beznosov
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: John Chuang
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Ed Talbot, Sean Peisert, Matt Bishop
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Joseph Bonneau, Edward W. Felten, Prateek Mittal, Arvind Narayanan
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Suresh Chari, Pau-Chen Cheng, Larry Koved, Ian Molloy, Youngja Park
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Eric Klieme, Klaus-Peter Engelbrecht, Sebastian Möller
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Yang Wang
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Chandrasekhar Bhagavatula, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, Blase Ur
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Lujo Bauer, Cristian Bravo-Lillo, Elli Fragkaki, William Melicher, Michael Stroucken
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Michael Karlesky, Napa Sae-Bae, Katherine Isbister, Nasir Memon
Publication: Symposium on Usable Privacy and Security (SOUPS) 2014 - Date: July 2014

Authors: Karen Renaud, Rosanne English, T. Wynne, F. Weber
Publication: Proceedings of the 8th International Symposium on Human Aspects of Information Security (HAISA 2014) - Date: July 8 2014

Authors: Karen Renaud, Melanie Volkamer, Joseph Maguire
Publication: Second International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014) - Date: June 22 2014

Authors: Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, Ning Xu
Publication: IEEE Transactions on Information Forensics and Security, Vol 9, No 6 - Date: June 2014

Authors: Nina Kolb, Steffen Bartsch, Melanie Volkamer, Joachim Vogt
Publication: 16th International Conference on Human-Computer Interaction (HCII 2014) - Date: June 2014

Authors: Ulrich Burgbacher, Klaus Hinrichs
Publication: Proceedings of the 2014 SIGCHI Conference on Human Factors in Computing Systems, CHI '14 - Date: April 2014

Authors: Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti
Publication: Proceedings of the 2014 SIGCHI Conference on Human Factors in Computing Systems, CHI '14 - Date: April 2014

Authors: Alexander De Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard Ewald Slawik, Heinrich Hussmann
Publication: Proceedings of the 2014 SIGCHI Conference on Human Factors in Computing Systems, CHI '14 - Date: April 2014

Authors: Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
Publication: Proceedings of the 2014 SIGCHI Conference on Human Factors in Computing Systems, CHI '14 - Date: April 2014

Authors: Yee-Yin Choong, Mary Theofanos, Hung-Kung Liu
Publication: NISTIR 7991 - Date: March 2014

Authors: Ahmad B. A. Hassanat
Publication: International Journal of Sciences: Basic and Applied Research, Vol 13, No 1 - Date: 2014

Authors: André Liechti
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Authors: Chris Warrington
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Authors: Asbjørn Reglund Thorsen
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Authors: Jeremiah Blocki, Manuel Blum, Anupam Datta
Publication: AsiaCrypt 2013 - Date: December 2013

Authors: Jeremiah Blocki, Manuel Blum, Anupam Datta
Publication: Proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013 - Date: December 2013

Authors: Per Thorsheim
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Authors: Nicolas Oberli, Manoé Zwahlen
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Authors: Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis
Publication: 20th ACM Conference on Computer and Communications Security, CCS 2013 - Date: December 2013

Authors: Marco Preuss
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Authors: Andrey Belenko
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Authors: Jan Fredrik Leversund
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Authors: Jeunese Payne
Publication: 5th International Conference on Passwords (Passwords13 Bergen) - Date: December 2013

Authors: Jeremiah Blocki, Manuel Blum, Anupam Datta
Publication: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, AISec '13 - Date: November 2013

Authors: Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz
Publication: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS '13 - Date: November 2013

Authors: Haichang Gao, Wei Wang, Jiao Qi, Xuqin Wang, Xiyang Liu, Jeff Yan
Publication: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS '13) - Date: November 4 2013

Authors: Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang
Publication: arXiv 1310.1540 - Date: October 2013

Authors: Ashar Javed
Publication: The 11th Annual HITB Security Conference in Asia (Hack In The Box 2013) - Date: October 17 2013

Authors: Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
Publication: Proceedings of the 14th IFIP TC 13 International Conference, INTERACT 2013 - Date: September 2013

Authors: Karen Renaud, Peter Mayer, Melanie Volkamer, Joseph Maguire
Publication: Proceedings of the 2013 Federated Conference on Computer Science and Information Systems (FedCSIS) - Date: September 8 2013

Authors: Lianying Zhao, Mohammad Mannan
Publication: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW '13 - Date: September 2013

Authors: Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle
Publication: Proceedings of the 2013 IEEE eCrime Researchers Summit (eCRS) - Date: September 2013

Authors: Sean Peisert, Ed Talbot, Tom Kroeger
Publication: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW '13 - Date: September 2013

Authors: Marios Belk, Christos Fidas, Panagiotis Germanakos, George Samaras
Publication: Proceedings of the 14th IFIP TC 13 International Conference, INTERACT 2013 - Date: September 2013

Authors: Emanuel von Zezschwitz, Alexander De Luca, Heinrich Hussmann
Publication: Proceedings of the 14th IFIP TC 13 International Conference, INTERACT 2013 - Date: September 2013

Authors: Anil Somayaji, David Mould, Carson Brown
Publication: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW '13 - Date: September 2013

Authors: Alina Hang, Alexander De Luca, Katharina Frison, Emanuel von Zezschwitz, Massimo Tedesco, Marcel Kockmann
Publication: Proceedings of the 14th IFIP TC 13 International Conference, INTERACT 2013 - Date: September 2013

Authors: Markus Dürmuth
Publication: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW '13 - Date: September 2013

Authors: Ziming Zhao, Gail-Joon Ahn, Jeon-Jin Seo, Hongxin Hu
Publication: Proceedings of the 22nd USENIX Security Symposium, Security '13 - Date: August 2013

Authors: Abe Singer, Warren Anderson
Publication: USENIX ;login:, Volume 38, Number 4 - Date: August 2013

Authors: Bruce K. Marshall
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Jens Steube [atom]
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Adam Goodman
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason Hong, Ian Oakley
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Robert David Graham
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Rick Redman [Minga]
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Steve Werby
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Jeffrey Goldberg
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Florian Schaub, Marcel Walch, Bastian Könings, Michael Weber
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Tom Steele
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Michal Špacek
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Russell Edward Graves [Bitweasil]
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Nami Hidaka, Saki Naguchi, Manabu Okamoto
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Dimitri Fousekis [rurapenthe]
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Elizabeth Stobert, Robert Biddle
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Dirk Van Bruggen, Shu Liu, Mitch Kajzer, Aaron Striegel, Charles R. Crowell, John D'Arcy
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Jens Steube [atom]
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Josh Dustin
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Jeffrey Goldberg
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Madoka Hasegawa, Keita Takahashi, Shigeo Kato
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Peter Kacherginsky [iphelix]
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: David Weinstein, Andrey Belenko
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Jean-Philippe Aumasson
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Julie Thorpe, Brent MacRae, Amirali Salehi-Abari
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Steve Thomas
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Marco Preuss
Publication: Passwords13 Las Vegas - Date: July 2013

Authors: Kyriakos Kafas, Nouf Aljaffan, Shujun Li
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Nathan Malkin, Shriram Krishnamurthi, David H. Laidlaw
Publication: Proceedings of the 9th Symposium On Usable Privacy and Security, SOUPS 2013 - Date: July 2013

Authors: Cormac Herley, Stuart Schechter
Publication: The Twelfth Workshop on the Economics of Information Security, WEIS 2013 - Date: June 2013

Authors: Jeremiah Blocki, Saranga Komanduri, Ariel Procaccia, Or Sheffet
Publication: Proceedings of the 14th ACM Conference on Electronic Commerce, EC '13 - Date: June 2013

Authors: Michael Lee, Alan Dunn, Jonathan Katz, Brent Waters, Emmett Witchel
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Authors: Ewa Syta, Bryan Ford
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Authors: Ari Juels, Ronald L. Rivest
Publication: - Date: May 2013

Authors: Martin Boonk, Ronald Petrlic, Christoph Sorge
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Authors: R.C. Johnson, Walter J. Scheirer, Terrance E. Boult
Publication: Proceedings of SPIE Volume 8712 - Date: May 2013

Authors: Bin B. Zhu, Dongchen Wei, Maowei Yang, Jeff Yan
Publication: Proceedings of the 22nd international conference on World Wide Web (WWW '13) - Date: May 13 2013

Authors: Karen Renaud, Joseph Maguire
Publication: Proceedings of the European Information Security Multi-Conference, EISMC 2013 - Date: May 2013

Authors: Takahiro Ishii, Atsushi Inoie, Manabu Okamoto
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Authors: Blase Ur, Saranga Komanduri, Richard Shay, Stephanos Matsumoto, Lujo Bauer, Nicolas Christin
Publication: 34th IEEE Symposium on Security and Privacy, SP '13 - Date: May 2013

Authors: David Aspinall, Mike Just
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Authors: Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Authors: Alexander De Luca, Emanuel von Zezschwitz, Ngo Dieu Huong Nguyen, Max-Emanuel Maurer, Elisa Rubegni, Marcello Paolo Scipioni
Publication: Proceedings of the 2013 SIGCHI Conference on Human Factors in Computing Systems, CHI '13 - Date: April 2013

Authors: Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Authors: Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, Cormac Herley
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13 - Date: April 2013

Authors: Sascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders, Matthew Smith
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Authors: Manal Adham, Amir Azodi, Yvo Desmedt, Ioannis Karaolis
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Authors: Tey Chee Meng, Payas Gupta, Debin Gao
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Authors: John Chuang, Hamilton Nguyen, Charles Wang, Benjamin Johnson
Publication: 2013 Workshop on Useable Security, USEC '13 - Date: April 2013

Authors: Jing Tian, Chengzhang Qu, Wenyuan Xu, Song Wang
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Authors: Serge Egelman
Publication: Proceedings of the 2013 SIGCHI Conference on Human Factors in Computing Systems, CHI '13 - Date: April 2013

Authors: Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong, Adrian Perrig
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Authors: Martin Emms, Budi Arief, Nicholas Little, Aad van Moorsel
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Authors: Tilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Authors: Haruhiko Fujii, Yukio Tsuruoka
Publication: Proceedings of the 17th International Conference on Financial Cryptography and Data Security 2013 / Lecture Notes in Computer Science, Volume 7859 - Date: April 2013

Authors: Lingjun Li, Xinxin Zhao, Guoliang Xue
Publication: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 - Date: April 2013

Authors: Majid Arianezhad, Douglas Stebila, Behzad Mozaffari
Publication: Financial Cryptography and Data Security 2013 Workshops, Lecture Notes in Computer Science Volume 7862, - Date: April 2013

Authors: Claude Castelluccia, Abdelberi Chaabane, Markus Dürmuth, Daniele Perito
Publication: arXiv:1304.6584v1 [cs.CR] - Date: April 2013

Authors: Ashwini Rao, Birendra Jha, Gananand Kini
Publication: Proceedings of the Third ACM Conference On Data and Application Security and PrivacY, CODASPY '13 - Date: February 2013

Authors: Christian Forler, Stefan Lucks, Jakob Wenzel
Publication: Cryptology ePrint Archive, Report 2013/525 - Date: 2013

Authors: Karen Renaud, Lewis Mackenzie
Publication: Journal of Artificial Societies and Social Simulation, Volume 16, Number 3 - Date: 2013

Authors: Nathan Malkin
Publication: Undergraduate Honors Thesis for Brown University - Date: 2013

Authors: Steve Thomas
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis
Publication: 28th Annual Computer Security Applications Conference (ACSAC) - Date: December 2012

Authors: Simon Marechal
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Martin Johns, Sebastian Lekies, Bastian Braun, Benjamin Flesch
Publication: 28th Annual Computer Security Applications Conference, ACSAC '12 - Date: December 2012

Authors: Shari Trewin, Cal Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
Publication: 28th Annual Computer Security Applications Conference, ACSAC '12 - Date: December 2012

Authors: Shiva Houshmand, Sudhir Aggarwal
Publication: 28th Annual Computer Security Applications Conference (ACSAC) - Date: December 2012

Authors: Russell Edward Graves [Bitweasil]
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Jeremy Spilman
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Kirsi Helkala
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Gildas Avoine, Adrien Bourgeois, Xavier Carpent
Publication: - Date: December 2012

Authors: Christophe Rosenberger
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Jens Steube
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Sebastien Raveau
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Norbert Schmitz
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Markus Dürmuth
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Yiorgis Gozadinos
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Paul Dunphy, Patrick Olivier
Publication: 28th Annual Computer Security Applications Conference (ACSAC) - Date: December 2012

Authors: Jeremi M. Gosney
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Tore Larsen Orderløkken
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Denise Ranghetti Pilar, Antonio Jaeger, Carlos F. A. Gomes, Lilian Milnitsky Stein
Publication: PLoS One v7(12): e51067 - Date: December 2012

Authors: Simon Marechal
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Colin Percival
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, P.C. van Oorschot
Publication: 28th Annual Computer Security Applications Conference (ACSAC) - Date: December 2012

Authors: Per Thorsheim
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Simon Marechal, Alexander Peslyak [Solar Designer]
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Dmitry Sumin
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Audun Jøsang
Publication: Passwords^12 (Passwords12) - Date: December 2012

Authors: Dinei Florencio, Cormac Herley
Publication: IEEE Journal of Security & Privacy, Volume 10, Issue 6 - Date: November 2012

Authors: Lim Kah Seng, Norafida Ithnin, Hazinah Kutty Mammi
Publication: International Journal of Security and Its Applications, Volume 6, Number 4 - Date: October 2012

Authors: John Steven
Publication: OWASP AppSec USA, 2012 - Date: October 2012

Authors: Jiawei Yuan, Lu Shi, Shucheng Yu, Ming Li
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Authors: Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, Krish Vitaldevaria
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Authors: Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie Downs, Saranga Komanduri, Stuart Schechter, Manya Sleeper
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Authors: Jan Camenisch, Anna Lysyanskaya, Gregory Neven
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Authors: Kenrick Mock, Bogdan Hoanca, Justin Weaver, Mikal Milton
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Authors: Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan Wallach, Dirk Balfanz
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Authors: San-Tsai Sun, Konstantin Beznosov
Publication: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12 - Date: October 2012

Authors: Rafael Veras, Julie Thorpe, Christopher Collins
Publication: Proceedings of the 9th Annual International Symposium on Visualization for Cyber Security VizSec '12 - Date: October 2012

Authors: Julie Thorpe, Amirali Salehi-Abari, Robert Burden
Publication: Proceedings of the 2012 Workshop on New Security Paradigms, NSPW '12 - Date: September 2012

Authors: Joseph Maguire, Karen Renaud
Publication: Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, BCS-HCI '12 - Date: September 2012

Authors: Aureliano Calvo, Ariel Futoransky, Carlos Sarraute
Publication: Anales del WSegI 2011 Workshop de Seguridad Informática - Date: August 2012

Authors: Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek
Publication: Proceedings of the 21st USENIX Conference on Security Symposium, Security '12 - Date: August 2012

Authors: George Argyros, Aggelos Kiayias
Publication: Proceedings of the 21st USENIX Conference on Security Symposium, Security '12 - Date: August 2012

Authors: Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln
Publication: Proceedings of the 21st USENIX Security Symposium, Security '12 - Date: August 2012

Authors: Stefano Ortolani, Bruno Crispo
Publication: Proceedings of the 7th USENIX Workshop on Hot Topics in Security, HotSec '12 - Date: August 2012

Authors: Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan Wallach
Publication: Proceedings of the 21st USENIX Security Symposium - Date: August 2012

Authors: Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos
Publication: Proceedings of the 21st USENIX Conference on Security Symposium, Security '12 - Date: August 2012

Authors: Markus Jakobsson, Mayank Dhiman
Publication: Proceedings of the 7th USENIX Workshop on Hot Topics in Security, HotSec '12 - Date: August 2012

Authors: Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Tim Vidas
Publication: Proceedings of the Symposium On Usable Privacy and Security, SOUPS '12 - Date: July 2012

Authors: Marek Klonowski, Krzysztof Majcher, Wojciech Macyna, Filip Zagorski
Publication: Proceedings of the Workshop on RFID Security - RFIDSec'12, Lecture Notes in Computer Science - Date: June 2012

Authors: Rene Mayrhofer, Thomas Kaiser
Publication: Proceedings of the Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, IWSSISPMU 2012 - Date: June 2012

Authors: Ivan Švogor, Tonimir Kišasondi
Publication: Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces (ITI) - Date: June 2012

Authors: Luigi Sportiello
Publication: Proceedings of the Workshop on RFID Security - RFIDSec'12, Lecture Notes in Computer Science - Date: June 2012

Authors: Gildas Avoine, Xavier Carpent
Publication: Proceedings of the Workshop on RFID Security - RFIDSec'12, Lecture Notes in Computer Science - Date: June 2012

Authors: Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Christin
Publication: 2012 IEEE Symposium on Security and Privacy - Date: May 2012

Authors: Andreas Bulling, Florian Alt, Albrecht Schmidt
Publication: Proceedings of the 2012 SIGCHI Conference on Human Factors in Computing Systems, CHI '12 - Date: May 2012

Authors: Joseph Bonneau, Cormac Herley, P.C. van Oorschot, Frank Stajano
Publication: 2012 IEEE Symposium on Security and Privacy - Date: May 2012

Authors: Joseph Bonneau
Publication: 2012 IEEE Symposium on Security and Privacy - Date: May 2012

Authors: Andrew A. Adams, Shirley A. Williams
Publication: SIGCAS Computers and Society, Volume 44, Number 1 - Date: May 2012

Authors: Lu Shi, Ming Li, Shucheng Yu, Jiawei Yuan
Publication: ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12 - Date: April 2012

Authors: David Malone, Kevin Maher
Publication: Proceedings of the 21st international conference on World Wide Web, WWW '12 - Date: April 2012

Authors: Jonathan Anderson, Robert N. M. Watson
Publication: Twentieth International Workshop on Security Protocols (SPW) - Date: April 2012

Authors: Joseph Bonneau, Ekaterina Shutova
Publication: Workshop on Usable Security USEC '12 - Date: March 2012

Authors: Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma, Suryakanth V. Gangashetty
Publication: International Journal of Network Security and Its Applications (IJNSA), Volume 4, Number 2 - Date: March 2012

Authors: Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, P.C. van Oorschot
Publication: Journal of IEEE Transactions on Dependable and Secure Computing, Vol 9, Issue 2 - Date: March 2012

Authors: Gildas Avoine, Xavier Carpent, Benjamin Martin
Publication: Journal of Network and Computer Applications, Volume 35, Number 2 - Date: March 2012

Authors: Alexei Czeskis, Dirk Balfanz
Publication: Workshop on Usable Security USEC '12 - Date: March 2012

Authors: Cormac Herley, P.C. van Oorschot
Publication: IEEE Security & Privacy, Vol. 10, No. 1 - Date: January 2012

Authors: Hsien-Cheng Chou, Hung-Chang Lee, Chih-Wen Hsueh, Fei-Pei Lai
Publication: International Journal of Innovative Computing, Information and Control, Volume 8, Number 1(A) - Date: January 2012

Authors: Kirsi Helkala, Nils Kalstad Svendsen, Per Thorsheim, Anders Wiehe
Publication: Proceedings of the 17th Nordic Conference on Information Security Technology for Applications NordSec '12, Lecture Notes in Computer Science, Volume 7617 - Date: 2012

Authors: Robert Biddle, Sonia Chiasson, P.C. van Oorschot
Publication: ACM Computing Surveys, Volume 44, Number 4 - Date: 2012

Authors: Kirsi Helkala, Nils Kalstad Svendsen
Publication: Proceedings of the 16th Nordic Conference on Information Security Technology for Applications NordSec '11 - Date: 2012

Authors: William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, William T. Polk, Sarbari Gupta
Publication: NIST Special Publication 800-63-1 - Date: December 12 2011

Authors: P.C. van Oorschot, Julie Thorpe
Publication: Journal of Computer Security, Volume 19, Number 4 - Date: December 2011

Authors: Mohammad Mannan, P.C. van Oorschot
Publication: Journal of Computer Security, Vol. 19, No. 4 - Date: December 2011

Authors: Kevin Curran, Jonathan Doherty, Ayleen McCann, Gary Turkington
Publication: The EDP Audit, Control and Security Newsletter, Volume 44, Issue 5 - Date: November 2011

Authors: Ziqing Mao, Dinei Florencio, Cormac Herley
Publication: 2011 IEEE International Workshop on Information Forensics and Security - Date: November 29 2011

Authors: Michael K. Gardner, Robert D. Hill, Christopher A. Was
Publication: PLoS One v6(10): e25428 - Date: October 2011

Authors: Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu
Publication: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11 - Date: October 2011

Authors: Kemal Bicakci, P.C. van Oorschot
Publication: Proceedings of the 2011 Workshop on New Security Paradigms NSPW '11 - Date: September 2011

Authors: Ahmad Salah El Admad, Jeff Yan
Publication: IEEE Internet Computing, Volume 16 Issue 2 / Technical Report CS-TR-1203 - Date: July 22 2011

Authors: Nur Haryani Zakaria, David Griffiths, Sacha Brostoff, Jeff Yan
Publication: Proceedings of the Seventh Symposium On Usable Privacy and Security, SOUPS '11 - Date: July 2011

Authors: Chunhua Chen, Chris J. Mitchell, Shaohua Tang
Publication: Mobile Networks and Applications - Date: July 2011

Authors: Per Thorsheim
Publication: Passwords^11 (Passwords11) - Date: June 2011

Authors: Andrey Malyshev, Dmitry Skylarov
Publication: Passwords^11 (Passwords11) - Date: June 2011

Authors: Markus Jakobsson, Ruj Akavipat
Publication: Passwords^11 (Passwords11) - Date: June 2011

Authors: James Nobis
Publication: Passwords^11 (Passwords11) - Date: June 2011

Authors: Simon Josefsson
Publication: Passwords^11 (Passwords11) - Date: June 2011

Authors: Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Serge Egelman
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11 - Date: May 2011

Authors: Kirsi Helkala
Publication: Journal of Computers, Volume 6, Number 5 - Date: May 2011

Authors: Ahmad Salah El Admad, Jeff Yan, Mohomad Tayara
Publication: - Date: May 2011

Authors: Robert W. Reeder, Stuart Schechter
Publication: Journal of IEEE Security and Privacy, Volume 9, Issue 2 - Date: March 2011

Authors: Ambarish Karole, Nitesh Saxena, Nicolas Christin
Publication: Lecture Notes in Computer Science, Volume 6829 - Date: 2011

Authors: Quan-a Jin, Da-Wu-a Gu, Jian-Jie-b Zhao
Publication: Journal of Shanghai Jiaotong University, Volume 45, Number 07 - Date: 2011

Authors: Frank Stajano
Publication: Proceedings of the 19th international conference on Security Protocols (SP'11) - Date: 3 2011

Authors: Meltem Sönmez Turan, Elaine Barker, William E. Burr, Lily Chen
Publication: NIST Special Publication 800-132 - Date: December 2010

Authors: Howard Smith
Publication: Passwordscon 2010 (Passwords10) - Date: December 2010

Authors: Emil Stefanov, Mikhail Atallah
Publication: Proceedings of the 2010 ACM workshop on Insider Threats, Insider Threats '10) - Date: October 2010

Authors: Suganya G., Karpgavalli S., Christina V.
Publication: International Journal of Computer Applications, Volume 7, Number 14 - Date: October 2010

Authors: Matt Weir, Sudhir Aggarwal, Michael Collins, Henry Stern
Publication: Proceedings of the 17th ACM conference on Computer and Communications Security CCS'10 - Date: October 2010

Authors: Yinqian Zhang, Fabian Monrose, Michael K. Reiter
Publication: Proceedings of the 17th ACM conference on Computer and Communications Security CCS '10 - Date: October 2010

Authors: San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov
Publication: Proceedings of the 2010 Workshop on New Security Paradigms NSPW '10 - Date: September 2010

Authors: Simon Parkin, Aad van Moorsel, Philip G. Inglesant, Martina Angela Sasse
Publication: Proceedings of the 2010 Workshop on New Security Paradigms NSPW '10 - Date: September 2010

Authors: Karen Renaud, Heather Crawford
Publication: International Workshop on Mobile Social Signal Processing, MSSP 2010 / Lecture Notes in Computer Science (LNCS), volume 8045 - Date: September 2010

Authors: Wanli Ma, John Campbell, Dat Tran, Dale Kleeman
Publication: 4th International Conference on Network and System Security, NSS 2010 - Date: September 1 2010

Authors: P.C. van Oorschot, Amirali Salehi-Abari, Julie Thorpe
Publication: IEEE Transactions on Information Forensics and Security, Volume 5, Number 3 - Date: September 2010

Authors: Mohamed Al-Fairuz, Karen Renaud
Publication: Information Security South Africa Conference 2010 - Date: August 2010

Authors: Dinei Florencio, Cormac Herley
Publication: Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS '10) - Date: July 14 2010

Authors: Haichang Gao, Xiuling Chang, Zhongjie Ren, Uwe Aickelin, Liming Wang
Publication: Proceedings of the International Conference on Image Analysis and Recognition, ICIAR2010 / Lecture Notes in Computer Science, Volume 6112 - Date: June 2010

Authors: Gildas Avoine, Xavier Carpent, Benjamin Martin
Publication: Proceedings of the Workshop on RFID Security - RFIDSec'10, Lecture Notes in Computer Science Volume 6370 - Date: June 2010

Authors: Joseph Bonneau, Sören Preibusch
Publication: WEIS '10: The 9th Workshop on the Economics of Information Security - Date: June 2010

Authors: Schalk Peach, Johannes Vorster, Renier van Heerden
Publication: Proceedings of the South African Information Security Multi-Conference - Date: May 2010

Authors: A.W. Roscoe, Chen Bangdao, Long H. Nguyen
Publication: Proceedings of the Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, IWSSISPMU 2010 - Date: May 2010

Authors: Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems, CHI '10 - Date: April 2010

Authors: Philip G. Inglesant, Martina Angela Sasse
Publication: Proceedings of the 2010 SIGCHI Conference on Human Factors in Computing Systems, CHI '10 - Date: April 2010

Authors: Karen Renaud, Mike Just
Publication: Proceedings of the 24th BCS Interaction Specialist Group Conference, BCS '10 - Date: 2010

Authors: Stuart Schechter, Cormac Herley, Michael Mitzenmacher
Publication: Proceedings of the 5th USENIX conference on Hot topics in security, HotSec'10 - Date: 2010

Authors: Joseph Bonneau, Mike Just, Greg Matthews
Publication: Proceedings of the Fourteenth International Conference on Financial Cryptography and Data Security 2010 - Date: 2010

Authors: Karen Renaud, Antonella De Angeli
Publication: Communications of the ACM, Volume 52, Issue 12 - Date: December 2009

Authors: Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy
Publication: 6th International Workshop on Visualization for Cyber Security, VizSec 2009 - Date: October 2009

Authors: Karen Renaud, Joseph Maguire
Publication: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, BCS-HCI '09 - Date: September 2009

Authors: Marcia Gibson, Karen Renaud, Marc Conrad, Carsten Maple
Publication: Proceedings of the 2009 Workshop on New Security Paradigms NSPW '09 - Date: September 2009

Authors: Cormac Herley
Publication: Proceedings of the 2009 Workshop on New Security Paradigms NSPW '09 - Date: September 2009

Authors: Ron Poet, Karen Renaud
Publication: International Journal of Pattern Recognition and Artificial Intelligence, Volume 23, Issue 05 - Date: August 2009

Authors: Karen Renaud
Publication: Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS '09) - Date: August 25 2009

Authors: Stuart Schechter, Robert W. Reeder
Publication: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09 - Date: July 2009

Authors: Stuart Schechter, A. J. Bernheim Brush, Serge Egelman
Publication: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09 - Date: July 2009

Authors: Mike Just, David Aspinall
Publication: Symposium on Usable Privacy and Security, SOUPS '09 - Date: July 2009

Authors: Ann-Marie Horcher, Gurvirender P. Tejay
Publication: Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, ISI '09 - Date: June 2009

Authors: Mike Just
Publication: Information Security Summit 2009 - Date: May 2009

Authors: Matt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek
Publication: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP '09 - Date: May 2009

Authors: Colin Percival
Publication: BSDCan 2009 - Date: May 2009

Authors: Karen Scarfone, Murugiah Souppaya
Publication: NIST Special Publication 800-118 (Draft) - Date: April 2009

Authors: Kostas Theoharoulis, Charalampos Manifavas, Ioannis Papaefstathiou
Publication: Proceedings of the 17th IEEE Symposium on Field Programmable Custom Computing Machines, FCCM '09 - Date: April 2009

Authors: Stuart Schechter, Serge Egelman, Robert W. Reeder
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2009 - Date: April 2009

Authors: Karen Renaud
Publication: Journal of Visual Languages & Computing, Volume 20, Issue 1 - Date: February 2009

Authors: Karen Renaud
Publication: International Journal of Information and Computer Security (IJICS), Vol. 3, No. 1 - Date: January 2009

Authors: Ron Poet, Karen Renaud
Publication: The Ergonomics Open Journal, Volume 2 - Date: 2009

Authors: Cormac Herley, P.C. van Oorschot, Andrew S. Patrick
Publication: International Conference on Financial Cryptography and Data Security (FC 2009) - Date: 2009

Authors: Amirali Salehi-Abari, Julie Thorpe, P.C. van Oorschot
Publication: Proceedings of the 24th Annual Computer Security Applications Conference ACSAC '08 - Date: December 2008

Authors: Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Proceedings of the 2008 Conference on Future Play: Research, Play, Share, Future Play '08 - Date: November 2008

Authors: Xun Dong, John A. Clark, Jeremy L. Jacob
Publication: Proceedings of the 10th International Conference on Information and Communications Security (ICICS '08) - Date: October 2008

Authors: Korey Johnson, Steffen Werner
Publication: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Volume 52, Number 6 - Date: September 2008

Authors: Sonia Chiasson, Alain Forget, Robert Biddle, P.C. van Oorschot
Publication: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers 2008 - Date: September 2008

Authors: Cormac Herley, Dinei Florencio
Publication: Proceedings of the 11th international conference on Information Security, ISC '08 - Date: September 2008

Authors: Kirsi Helkala, Einar Snekkenes
Publication: Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008) - Date: July 2008

Authors: Sonia Chiasson, Alain Forget, Robert Biddle
Publication: Symposium on Accessible Privacy and Security (SOAPS) 2008 - Date: July 2008

Authors: Daniel LeBlanc, Sonia Chiasson, Alain Forget, Robert Biddle
Publication: Proceedings of the Symposium On Usable Privacy and Security, SOUPS '08 - Date: July 2008

Authors: Alain Forget, Sonia Chiasson, P.C. van Oorschot, Robert Biddle
Publication: Proceedings of the 4th Symposium on Usable Privacy and Security SOUPS '08 - Date: July 2008

Authors: Jeremy Clark, Urs Hengartner
Publication: The 3rd USENIX Workshop on Hot Topics in Security, HotSec '08 - Date: July 2008

Authors: Karen Renaud, Anthony McBryan, Paul Siebert
Publication: IADIS Computer Graphics and Visualization, CGV 2008 - Date: July 2008

Authors: Ariel Rabkin
Publication: Proceedings of the 4th Symposium On Usable Privacy and Security, SOUPS '08 - Date: July 2008

Authors: Alain Forget, Sonia Chiasson, P.C. van Oorschot, Robert Biddle
Publication: Proceedings of the International Conference on Persuasive Technology (PT) 2008 - Date: June 2008

Authors: Jim Owens, Jeanna Matthews
Publication: First USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '08 - Date: April 2008

Authors: Michael Toomim, Xianhang Zhang, James Fogarty, James A. Landay
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '08 - Date: April 2008

Authors: Sonia Chiasson, Jayakumar Srinivasan, Robert Biddle, P.C. van Oorschot
Publication: Proceedings of the 1st Conference on Usability, Psychology, and Security, UPSEC '08 - Date: April 2008

Authors: Markus Jakobsson, Erik Stolterman, Susanne Wetzel, Liu Yang
Publication: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '08 - Date: April 2008

Authors: Julie Thorpe
Publication: PhD Thesis for Carleton University - Date: January 2008

Authors: John-Robert Skrabanek
Publication: Kentucky Law Journal, Volume 97, Number 4, 2008-2009 - Date: 2008

Authors: Russell Edward Graves [Bitweasil]
Publication: Masters Thesis for Iowa State University - Date: 2008

Authors: Alain Forget, Robert Biddle
Publication: Proceedings of Conference on Human Factors in Computing Systems (CHI) 2008 - Date: 2008

Authors: Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig
Publication: Proceedings of the 4th Symposium On Usable Privacy and Security, SOUPS '08 - Date: 2008

Authors: Karen Renaud, Richard Cooper, Mohamed Al Fairuz
Publication: IADIS International Conference e-commerce 2007 - Date: December 7 2007

Authors: Paul Dunphy, Jeff Yan
Publication: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07 - Date: October 2007

Authors: Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Anti-Phishing Working Group (APWG) eCrime Researchers Summit 2007 - Date: October 2007

Authors: Michael W. Brogan, Ching-Ping Lin, Rakesh Pai, Ira J. Kalet
Publication: Proceedings of the AMIA Annual Symposium 2007 - Date: October 2007

Authors: Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007 - Date: October 15 2007

Authors: Krzysztof Golofit
Publication: 2nd International Workshop on Secure Information Systems, SIS '07 - Date: October 2007

Authors: Karen Renaud
Publication: Reliability Engineering & System Safety, Volume 92, Issue 9 - Date: September 2007

Authors: Krzysztof Golofit
Publication: Lecture Notes in Computer Science, 2007, Volume 4734/2007 - Date: September 2007

Authors: Sonia Chiasson, P.C. van Oorschot, Robert Biddle
Publication: Proceedings of ESORICS 2007 - Date: September 2007

Authors: Julie Thorpe, P.C. van Oorschot
Publication: Proceedings of the 16th USENIX Security Symposium - Date: August 2007

Authors: Sonia Chiasson, Robert Biddle, P.C. van Oorschot
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Authors: Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Authors: Alain Forget, Sonia Chiasson, Robert Biddle
Publication: Symposium on Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Authors: Paul Dunphy, Jeff Yan
Publication: Proceedings of the 3rd Symposium On Usable Privacy and Security, SOUPS '07 - Date: July 2007

Authors: Ahmet Emir Dirik, Nasir Memon, Jean-Camille Birget
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Authors: Karen Renaud, Judith Ramsay
Publication: Behaviour & Information Technology, Volume 26, Issue 4 - Date: July 2007

Authors: Rosa R. Heckle, Wayne G. Lutters
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Authors: Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Authors: Bruce K. Marshall
Publication: - Date: July 2007

Authors: Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007 - Date: July 2007

Authors: Michael D. Leonhard, V. N. Venkatakrishnan
Publication: Proceedings of the IEEE Electro/Information Technology Conference (EIT) 2007 - Date: May 2007

Authors: Dinei Florencio, Cormac Herley
Publication: Proceedings of the 16th international conference on the World Wide Web - Date: May 2007

Authors: Druid
Publication: - Date: May 2007

Authors: Stuart Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer
Publication: Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP '07) - Date: May 20 2007

Authors: Sonia Chiasson, Robert Biddle
Publication: CHI 2007 Workshop on Security User Studies - Date: April 2007

Authors: John Campbell, Dale Kleeman, Wanli Ma
Publication: Journal of Information Systems Security, Volume 16, Issue 1 - Date: January 2007

Authors: Mark Keith, Benjamin Shao, Paul John Steinbart
Publication: International Journal of Human-Computer Studies, Vol 65, Issue 1 - Date: January 2007

Authors: F. Asgharpour, Markus Jakobsson
Publication: Proceedings of the First International Workshop on Security for Spontaneous Interaction, IWIISI '07 - Date: 2007

Authors: Xavier Boyen
Publication: Proceedngs of the 6th USENIX Security Symposium (SECURITY 2007) - Date: 2007

Authors: Ann Nosseir, Richard Connor, Karen Renaud
Publication: Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments, OZCHI '06 - Date: November 2006

Authors: John Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung
Publication: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS '06 - Date: October 2006

Authors: Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri
Publication: IEEE Transaction on Dependable and Secure Computing, Vol 3(4) - Date: October 2006

Authors: Sonia Chiasson, P.C. van Oorschot, Robert Biddle
Publication: Proceedings of the 15th USENIX Security Symposium (Security '06) - Date: July 2006

Authors: Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor
Publication: Proceedings of the 2nd Symposium On Usable Privacy and Security, SOUPS '06 - Date: July 2006

Authors: Shirley Gaw, Edward W. Felten
Publication: Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2006 - Date: July 2006

Authors: Volker Roth, Kai Richter
Publication: Journal of Banking and Finance, 30(6) - Date: June 2006

Authors: Daphna Weinshall
Publication: Proceedings of the 2006 IEEE Symposium on Security and Privacy - Date: May 2006

Authors: Shannon Riley
Publication: Usability News, Volume 8, Issue 1 - Date: February 2006

Authors: Kenneth Allendoerfer, Shantanu Pai
Publication: Federal Aviation Administration Technical Report DOT/FAA/TC-06/09 - Date: January 2006

Authors: Steven Furnell, Leith Zekri
Publication: Network Security, Volume 2006, Issue 1 - Date: January 2006

Authors: Furkan Tari, A. Ant Ozok, Stephen H. Holden
Publication: Proceedings of the Second Symposium on Usable Privacy and Security, ACM International Conference Proceedings Series; Volume 149 - Date: 2006

Authors: Deborah Sater Carstens, Linda C. Malone
Publication: Journal of Information, Information Technology, and Organizations, Volume 1 - Date: 2006

Authors: Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel
Publication: International Conference on Information Systems Security, ICISS 2006 / Lecture Notes in Computer Science, Volume 4332 - Date: 2006

Authors: Joseph A. Cazier, B. Dawn Medlin
Publication: Journal of Information Systems Security, Volume 15, Issue 6 - Date: 2006

Authors: Mark Burnett
Publication: ISBN-13: 978-1597490412 - Date: December 2005

Authors: Daniel R. L. Brown
Publication: Cryptology ePrint Archive: Report 2005/434 - Date: December 15 2005

Authors: Arvind Narayanan, Vitaly Shmatikov
Publication: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS '05 - Date: November 2005

Authors: Marco Antônio Carnut, Evandro Curvelo Hora
Publication: Proceedings of the 7th Symposium on Security in Informatics (7o Simpósio Segurança em Informática) - Date: November 2005

Authors: Dirk Weirich
Publication: PhD Thesis for University College London - Date: October 2005

Authors: Kenneth Allendoerfer, Shantanu Pai
Publication: Federal Aviation Administration Technical Report DOT/FAA/CT-05/20 - Date: September 2005

Authors: Julie Thorpe, P.C. van Oorschot, Anil Somayaji
Publication: Proceedings of the 2005 Workshop on New Security Paradigms NSPW '05 - Date: September 2005

Authors: Karen Renaud
Publication: Proceedings of the 11th International Conference on Human-Computer Interaction (HCI 2005) / People and Computers XIX — The Bigger Picture - Date: July 22 2005

Authors: K. Kotani, K. Horii
Publication: Behaviour & Information Technology, Volume 24, Number 4 - Date: July 2005

Authors: Antonella De Angeli, Lynne Coventry, Graham Johnson, Karen Renaud
Publication: International Journal of Human-Computer Studies, Volume 63, Issues 1-2 - Date: July 2005

Authors: Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir Memon
Publication: International Journal of Human-Computer Studies, Volume 63, Issues 1-2 - Date: July 2005

Authors: Steven Furnell
Publication: Network Security, Volume 2005, Issue 3 - Date: March 2005

Authors: J. Alex Halderman, Brent Waters, Edward W. Felten
Publication: International World Wide Web Conference Committee (IW3C2), WWW 2005 - Date: 2005

Authors: Richard Roberts
Publication: Masters Thesis for the University of Liverpool, UK - Date: 2005

Authors: Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
Publication: ECRYPT workshop Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS) - Date: 2005

Authors: Mike Just
Publication: Security and Usability: Designing Secure Systems That People Can Use - Date: 2005

Authors: Karen Renaud
Publication: Security and Usability: Designing Secure Systems That People Can Use - Date: 2005

Authors: Virgil Griffith, Markus Jakobsson
Publication: Lecture Notes in Computer Science, Volume 3531 - Date: 2005

Authors: Ant Allan, Clare Hirst, Jay Heiser, Avivah Litan
Publication: G00124965 - Date: December 17 2004

Authors: Karen Renaud, Antonella De Angeli
Publication: Interacting with Computers, Volume 16, Issue 6 - Date: December 2004

Authors: Ant Allan
Publication: Gartner G00124970 - Date: December 6 2004

Authors: Julie Thorpe, P.C. van Oorschot
Publication: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC) - Date: December 2004

Authors: Ross Anderson, Haowen Chan, Adrian Perrig
Publication: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP) - Date: October 2004

Authors: Karen Renaud
Publication: Journal of Web Engineering, Volume 3, Number 2 - Date: October 2004

Authors: Mike Just
Publication: IEEE Security & Privacy Journal, Volume 2, Number 5 - Date: September 2004

Authors: Sacha Brostoff
Publication: PhD Thesis for University College London - Date: September 2004

Authors: Martin Abadi, Cédric Fournet
Publication: Theoretical Computer Science, Volume 322, Number 3 - Date: September 2004

Authors: Earl Perkins
Publication: META Group Practice, 2254 - Date: September 16 2004

Authors: Alen Peacock, Xian KE, Matthew Wilkerson
Publication: IEEE Security & Privacy, Volume 2, Number 5 - Date: September 2004

Authors: Julie Thorpe, P.C. van Oorschot
Publication: Proceedings of the 13th USENIX Security Symposium, Security '04 - Date: August 11 2004

Authors: Adam Stubblefield, Dan Simon
Publication: MSR-TR-2004-85 - Date: August 2004

Authors: Darren Davis, Fabian Monrose
Publication: Proceedings of the 13th USENIX Security Symposium, Security '04 - Date: August 11 2004

Authors: Luiz H. R. Sucupira Jr., Livia C. F. Araujo, Miguel G. Lizarraga, Lee L. Ling
Publication: Proceedings of the First International Conference on Biometric Authentication, ICBA 2004 - Date: July 2004

Authors: Miguel G. Lizarraga, Lee L. Ling
Publication: Proceedings of the First International Conference on Biometric Authentication, ICBA 2004 - Date: July 2004

Authors: Livia C. F. Araujo, Luiz H. R. Sucupira Jr., Miguel G. Lizarraga, Lee L. Ling, Joao B. T. Yabu-uti
Publication: Proceedings of the First International Conference on Biometric Authentication, ICBA 2004 - Date: July 2004

Authors: Alan S. Brown, Elisabeth Bracken, Sandy Zoccoli, King Douglas
Publication: Applied Cognitive Psychology, Volume 18, Issue 6 - Date: June 15 2004

Authors: Marie Sandstrom
Publication: - Date: June 10 2004

Authors: Earl Perkins
Publication: META Group Delta, 2978 - Date: June 29 2004

Authors: Deholo Nali, Julie Thorpe
Publication: TR-04-01 - Date: May 27 2004

Authors: Earl Perkins
Publication: META Group Delta, 2920 - Date: May 20 2004

Authors: Betty J. Brown, Ken Callis
Publication: - Date: April 25 2004

Authors: Daphna Weinshall, Scott Kirkpatrick
Publication: Proceedings of the Conference on Computer Human Interaction (CHI) 2004 - Date: April 2004

Authors: Blake Ives, Kenneth R. Walsh, Helmut Schneider
Publication: Communications of the ACM, Volume 47, Issue 4 - Date: April 2004

Authors: Lawrence O'Gorman, Amit Bagga, Jon Bentley
Publication: Proceedings of Financial Cryptography 04 - Date: February 2004

Authors: Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
Publication: Proceedings of the 31st ACM Symposium on Principles of Programming Languages, POPL '04 - Date: January 2004

Authors: Ryan Lim
Publication: - Date: January 22 2004

Authors: Art Conklin, Glenn Dietrich, Diane Walz
Publication: Proceedings of the 37th Hawaii International Conference on System Sciences 2004 - Date: January 2004

Authors: Steven Furnell, I. Papadopoulos, P. S. Dowland
Publication: Information Management and Computer Security, Volume 12, Number 2 - Date: 2004

Authors: Volker Roth, Kai Richter, Rene Freidinger
Publication: Proceedings of the 11th ACM Conference on Computer and Communications Security - Date: 2004

Authors: Deborah Sater Carstens, Pamela R. McCauley-Bell, Linda C. Malone, Ronald F. DeMara
Publication: Informing Science Journal, Volume 7 - Date: 2004

Authors: Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
Publication: The Journal of Systems and Software, Number 71 - Date: 2004

Authors: Merrill Warkentin, Kimberly Davis, Ernst Bekkering
Publication: Journal of Organizational and End User Computing, Volume 16, Number 3 - Date: 2004

Authors: Wayne C. Summers, Edward Bosworth
Publication: Proceedings of the Winter International Symposium on Information and Communication Technologies - Date: 2004

Authors: Daphna Weinshall
Publication: Technical Report 2004-30 - Date: 2004

Authors: Lawrence O'Gorman
Publication: Proceedings of the IEEE, Volume 91, Issue 12 - Date: December 2003

Authors: Lucy Jin, Xian Ke, Ryan Manuel, Matthew Wilkerson
Publication: MIT 6.857 Computer and Network Security course - Date: December 2003

Authors: Kim-Phuong L. Vu, Abhilasha Bhargav, Robert W. Proctor
Publication: Proceedings of the 47th annual meeting of the Human Factors and Ergonomics Society, Volume 47, Number 11 - Date: October 2003

Authors: Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi
Publication: Proceedings of the 2003 Workshop on New Security Paradigms NSPW '03 - Date: September 2003

Authors: Tom Perrine, Devin Kowatch
Publication: - Date: September 2003

Authors: Jim Liddell, Karen Renaud, Antonella De Angeli
Publication: 17th Annual Human Computer Interaction Conference, HCI 2003 - Date: September 2003

Authors: Philippe Oechslin
Publication: Proceedings of Advances in Cryptology, Crypto '03 - Lecture Notes in Computer Science, Volume 2729 - Date: August 2003

Authors: Cheng-Chi Lee, Min-Shiang Hwang, Li-Hua Li
Publication: Applied Mathematics and Computation, Volume 139, Issue 2-3 - Date: July 2003

Authors: Eric Ogren
Publication: - Date: June 17 2003

Authors: Jim Hurley
Publication: Ask the Analysts - Date: May 1 2003

Authors: Alan H. Karp
Publication: Technical Report HPL-2002-39 (R.1) - Date: May 6 2003

Authors: Sacha Brostoff, Martina Angela Sasse
Publication: Proceedings of CHI 2003, Workshop on Human-Computer Interaction and Security Systems - Date: April 2003

Authors: Nathanael Paul, David Evans, Aviel D. Rubin, Dan Wallach
Publication: Proceedings of CHI 2003, Workshop on Human-Computer Interaction and Security Systems - Date: April 2003

Authors: Mike Just
Publication: Proceedings of CHI 2003, Workshop on Human-Computer Interaction and Security Systems - Date: April 2003

Authors: Lynne Coventry, Antonella De Angeli, Graham Johnson
Publication: Proceedings of CHI 2003, Workshop on Human-Computer Interaction and Security Systems - Date: April 2003

Authors: Author(s) Unknown
Publication: - Date: March 2003

Authors: Mike Bond, Piotr Zielinski
Publication: University of Cambridge Technical Report #560 - Date: February 2003

Authors: Chris King
Publication: META Group Client Advisor, 705 - Date: January 20 2003

Authors: Benny Pinkas, Tomas Sander
Publication: Proceedings of the 9th ACM Conference on Computer and Communications Security - Date: November 2002

Authors: John Michael Williams
Publication: Proceedings of the 2002 Workshop on New Security Paradigms NSPW '02 - Date: September 2002

Authors: Robert W. Proctor, Mei-Ching Lien, Kim-Phuong L. Vu, E. Eugene Schultz, Jr., Gavriel Salvendy
Publication: Behavior Research Methods, Instruments & Computers, 34 - Date: May 2002

Authors: Earl Perkins
Publication: META Group Delta, 969 - Date: February 19 2002

Authors: Fabian Monrose, Michael K. Reiter, Susanne Wetzel
Publication: International Journal on Information Security, Volume 1, Number 2 - Date: February 2002

Authors: Christoph Steigner, Jürgen Wilke
Publication: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002) - Date: January 2002

Authors: Joseph Bonneau, Sören Preibusch, Ross Anderson
Publication: FC '12: The 16th International Conference on Financial Cryptography - Date: 2002

Authors: Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
Publication: Lecture Notes in Computer Science, Number 2437 - Date: 2002

Authors: I. Irakleous, Steven Furnell, P. S. Dowland, M. Papadaki
Publication: Information Management and Computer Security, Volume 10, Number 3 - Date: 2002

Authors: Edward F. Gehringer
Publication: 2002 International Symposium on Technology and Society, ISTAS '02 - Date: 2002

Authors: John Girard
Publication: Gartner T-14-9809 - Date: December 13 2001

Authors: Richard E. Smith
Publication: ISBN-13: 978-0201615999 - Date: October 2001

Authors: Jeff Yan
Publication: ACM New Security Paradigms Workshop - Date: September 2001

Authors: Kanta Matsuura
Publication: Proceedings of the 2001 International Workshop on Cryptology and Network Security - Date: September 2001

Authors: Karen Renaud, Elme Smith
Publication: Annual Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT '01 - Date: September 2001

Authors: Dirk Weirich, Martina Angela Sasse
Publication: Proceedings of the New Security Paradigms Workshop 2001 - Date: September 2001

Authors: Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster
Publication: Proceedings of the USENIX Security Symposium - Date: August 2001

Authors: Martina Angela Sasse, Sacha Brostoff, Dirk Weirich
Publication: BT Technology Journal, Volume 19, Issue 3 - Date: July 2001

Authors: Dirk Weirich, Martina Angela Sasse
Publication: CHI 2001 - Date: April 2001

Authors: Kristen Noakes-Fry, Ant Allan
Publication: Gartner TU-12-9616 - Date: February 6 2001

Authors: Simon Liu, Mark Silverman
Publication: IT Professional, Volume 3, Number 1 - Date: January 2001

Authors: Roberta J. Witty
Publication: Gartner QA-12-8664 - Date: January 30 2001

Authors: Niklas Frykholm, Ari Juels
Publication: Proceedings of the ACM Conference on Computer and Communication Security (CCS '01) - Date: 2001

Authors: Khaled El Emam, Katherine Moreau, Elizabeth Jonker
Publication: Journal of Medical Internet Research 2011;13(1):e18 - Date: 2001

Authors: John O. Pliam
Publication: First International Conference in Cryptology in India, INDOCRYPT 2000 - Date: December 2000

Authors: Chris Christiansen, Nora S. Freedman, Brian Burke, Charles Kolodgy
Publication: IDC Bulletin #23270 - Date: November 2000

Authors: Rachael Pond, John Podd, Julie Bunnell, Ron Henderson
Publication: Computers and Security, Volume 19, Number 7 - Date: November 2000

Authors: Jim Alves-Foss
Publication: 23rd National Information Systems Security Conference - Date: October 2000

Authors: Jason Hong, Hesham Kamel, John Kodumal, Francis Li, James Lin
Publication: Survey Project Requirement for IS 271, University of California Berkeley - Date: October 11 2000

Authors: Taekyoung Kwon, Jooseok Song
Publication: IEICE TRANSACTIONS on Communications Vol.E83-B No.9 - Date: September 20 2000

Authors: Sacha Brostoff, Martina Angela Sasse
Publication: Proceedings of CHI 2000, People and Computers XIV - Date: September 2000

Authors: Jeff Yan, Alan Blackwell, Ross Anderson, Alasdair Grant
Publication: University of Cambridge Technical Report, UCAM-CL-TR-500 - Date: September 2000

Authors: Shaohua Tang
Publication: Journal of Circuits, Systems, and Computers, Volume 10, Number 3/4 - Date: June 2000

Authors: Fabian Monrose, Aviel D. Rubin
Publication: Future Generation Computing Systems (FGCS) Journal: Security on the Web (special issue) - Date: March 2000

Authors: Chris King
Publication: META Group Delta, 881 - Date: March 28 2000

Authors: Carl Ellison, Chris Hall, Randy Milbert, Bruce Schneier
Publication: Journal of Future Generation Computer Systems, Volume 16, Number 4 - Date: 2000

Authors: Anne Adams, Martina Angela Sasse
Publication: Communications of the ACM, Volume 42, Issue 12 - Date: December 1999

Authors: Stephen H. Brackin
Publication: 22nd National Information Systems Security Conference - Date: October 1999

Authors: Jim Alves-Foss
Publication: 22nd National Information Systems Security Conference - Date: October 1999

Authors: Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang
Publication: Journal of Information Science and Engineering: Volume 15, Number 4 - Date: July 1999

Authors: Ted Julian
Publication: The Forrester Report - Date: June 1999

Authors: N. Provos, David Mazieres
Publication: Proceedings of the 1999 USENIX Annual Technical Conference - Date: June 1999

Authors: Marlo Kosanovich
Publication: META Group Delta, 779 - Date: April 29 1999

Authors: Anil K. Jain, Lin Hong, Y. Kulkarni
Publication: 2nd International Conference on Audio and Video-based Biometric Person Authentication - Date: March 1999

Authors: Thomas Wu
Publication: Proceedings of the 1999 ISOC Symposium on Network and Distributed System Security - Date: February 1999

Authors: Ari Juels, Martin Wattenberg
Publication: Proceedings of the 6th ACM Conference on Computer and Communications Security - Date: 1999

Authors: Min-Shiang Hwang
Publication: International Journal of Computer Mathematics, Volume 70, Number 4 - Date: 1999

Authors: Stuart Schechter, Todd Parnell, Alexander Hartemink
Publication: Proceedings of the Third International Conference on Financial Cryptography, FC '99 - Date: 1999

Authors: Adrian Perrig, Dawn Song
Publication: Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99) - Date: 1999

Authors: Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
Publication: ACM Transactions on Information and System Security (TISSEC), Volume 1, Issue 1 - Date: November 1998

Authors: Akihiro Shimizu, Tsumotu Horioka, Hirohito Inagaki
Publication: IEICE Transactions on Communications: Volume E81-B, Number 8 - Date: August 1998

Authors: Jong-Hyeon Lee
Publication: - Date: August 1998

Authors: Tsumotu Horioka, Akihiro Shimizu
Publication: INET '98 Conference Proceedings - Date: July 1998

Authors: Bruce K. Marshall
Publication: Black Hat USA 1998 - Date: July 1998

Authors: Mihir Bellare, Ran Canetti, Hugo Krawczyk
Publication: Proceedings of the 30th Annual Symposium on the Theory of Computing / Eurocrypt 1998? - Date: 1998

Authors: Willem G. de Ru, Jan H. P. Eloff
Publication: IEEE Expert: Intelligent Systems and Their Applications, Volume 12, Issue 6 - Date: November 1997

Authors: Anne Adams, Martina Angela Sasse, Peter Lunt
Publication: People and Computers XII, Proceedings of HCI '97 - Date: August 1997

Authors: Charles Cresson Wood
Publication: Information Management & Computer Security, Volume 5, Number 2/3 - Date: July 25 1997

Authors: Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
Publication: Proceedings of the 4th ACM Conference on Computer and Communications Security, CCS '97 - Date: April 1997

Authors: Julie Bunnell, John Podd, Ron Henderson, R. Napier, J. Kennedy-Moffat
Publication: Computers and Security, Volume 16, Number 7 - Date: 1997

Authors: Kurt Hockenbury
Publication: - Date: 1997

Authors: John Podd, Julie Bunnell, Ron Henderson
Publication: Proceedings of the 6th Australian Conference on Computer-Human Interaction (OZCHI '96) - Date: November 1996

Authors: Kate Barrelle, William Laverty, Ron Henderson, Jon Gough, Michael Wagner, Michael Hiron
Publication: International Journal of Human-Computer Studies, Volume 45, Issue 1 - Date: July 1996

Authors: Udi Manber
Publication: Computers and Security, Volume 15 Number 2 - Date: 1996

Authors: Y. Harada, K. Kuroki
Publication: Reports of National Research Institute of Police Science, 37 - Date: 1996

Authors: Charles Cresson Wood
Publication: Information Management & Computer Security, Volume 4, Number 1 - Date: 1996

Authors: Aviel D. Rubin
Publication: USENIX Computing Systems Volume 9, Number 1 - Date: 1996

Authors: Arnold Reinhold
Publication: - Date: July 28 1995

Authors: Horng-Twu Liaw, Chin-Laung Lei
Publication: Cryptologia, Volume XIX, Number 2 - Date: April 1995

Authors: Matt Bishop, Daniel V. Klein
Publication: Computers and Security, Volume 14, Number 3 - Date: 1995

Authors: Chin-Chen Chang, Wen-Yuan Liao
Publication: Computers & Security, Volume 13, Number 2 - Date: April 1994

Authors: Ravi Ganesan, Chris Davies
Publication: Proceedings of the 17th National Computer Security Conference - Date: 1994

Authors: Yishay Spector, Jacob Ginzberg
Publication: Computers and Security, Volume 13, Number 2 - Date: 1994

Authors: Unknown
Publication: Federal Information Processing Standards - Date: October 5 1993

Authors: Moshe Zviran, William J. Haga
Publication: The Computer Journal, Volume 36, Number 3 - Date: June 1993

Authors: B. Clifford Neuman, Stuart G. Stubblebine
Publication: Operating Systems Review: Volume 27, Number 2 - Date: April 1993

Authors: Chris Davies, Ravi Ganesan
Publication: Proceedings of the National Computer Security Conference ’93, the 16th NIST/NSA conference - Date: 1993

Authors: Butler W. Lampson, Martin Abadi, Michael Burrows, Edward Wobber
Publication: ACM Transactions on Computer Systems Volume 10, Number 4 - Date: November 1992

Authors: Matt Bishop
Publication: Proceedings of the 3rd UNIX Security Symposium - Date: September 1992

Authors: Eugene Spafford
Publication: Purdue Technical Report CSD-TR 92-049 - Date: July 31 1992

Authors: Eugene Spafford
Publication: Computers & Security, Volume 11, Number 3 - Date: May 1992

Authors: Tzong-Chen Wu, Chin-Chen Chang
Publication: International Journal of Computer Mathematics, Volume 41, Number 1-2 - Date: December 1991

Authors: Matt Bishop
Publication: Proceedings of the 3rd Workshop on Computer Incident Handling - Date: August 1991

Authors: Daniel V. Klein
Publication: Proceedings of the 14th DoE Computer Security Group - Date: May 1991

Authors: Matt Bishop
Publication: Proceedings of the 7th International Conference on Information Security / PCS-TR90-152 - Date: May 1991

Authors: William J. Haga, Moshe Zviran
Publication: Information Systems, Volume 16, Number 3 - Date: 1991

Authors: Moshe Zviran, William J. Haga
Publication: Journal of Computing, Number 36? - Date: December 1990

Authors: Moshe Zviran, William J. Haga
Publication: Proceedings of the 5th Jerusalem Conference on 'Next Decade in Information Technology' (Cat. No.90TH0326-9) - Date: October 1990

Authors: Chin-Chen Chang, Ling-Hua Wu
Publication: Journal of Information Science and Engineering: Volume 6, Number 2 - Date: June 1990

Authors: Li Gong, D. J. Wheeler
Publication: Journal of Cryptology: Volume 2, Number 2 - Date: 1990

Authors: Michele D. Crabb
Publication: Proceedings of the Second USENIX UNIX Security Workshop - Date: 1990

Authors: Michael Burrows, Martin Abadi, Roger M. Needham
Publication: Proceedings of the 12th ACM Symposium on Operating System Principles - Date: December 1989

Authors: Khrosrow Dehnad
Publication: Computers and Security, Volume 8, Number 7 - Date: November 1989

Authors: David L. Jobusch, Arthur E. Oldehoeft
Publication: Computers and Security, Volume 8, Number 7 - Date: November 1989

Authors: David L. Jobusch, Arthur E. Oldehoeft
Publication: Computers and Security, Volume 8, Number 9 - Date: November 1989

Authors: Don Seeley
Publication: Communications of the ACM, Volume 32, Issue 6 - Date: June 1989

Authors: Michael Luby, Charles Rackoff
Publication: Journal of Cryptology Volume 1, Number 3 - Date: 1989

Authors: William J. Haga, Moshe Zviran
Publication: Data Processing and Communications Security 3 - Date: 1989

Authors: Bruce L. Riddle, Murray S. Miron, Judith A. Semo
Publication: Computers and Security, Volume 8, Number 7 - Date: 1989

Authors: John B. Nagle
Publication: comp.sources.unix 16(60) - Date: November 1988

Authors: Ana Marie De Alvare, E. Eugene Schultz, Jr.
Publication: UNIX Security Workshop Proceedings - Date: August 1988

Authors: Michael Burrows, Martin Abadi, Roger M. Needham
Publication: University of Cambridge Technical Report #138 - Date: June 1988

Authors: Belden Menkus
Publication: Computers and Security, Volume 7, Issue 2 - Date: April 1988

Authors: S. L. Smith
Publication: Computers and Security, Number 6? - Date: 1987

Authors: W. L. Price
Publication: Technical Report DITC 73/86 - Date: July 1986

Authors: Andrew D. Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
Publication: Proceedings of the 1986 IEEE Symposium on Security and Privacy - Date: April 1986

Authors: Unknown
Publication: - Date: May 1985

Authors: Fred Cohen
Publication: Information Age, Volume 7, Number 1 - Date: February 1985

Authors: Kamaljit Singh
Publication: ACM SIGOPS Operating Systems Review, Volume 19, Issue 1 - Date: January 1985

Authors: Ben F. Barton, Marthalee S. Barton
Publication: Computers & Security, Volume 3, Issue 3 - Date: 1984

Authors: Sigmund N. Porter
Publication: Computers and Security, Volume 1, Number 1 - Date: January 1982

Authors: Leslie Lamport
Publication: Communications of the ACM, Volume 24, Number 11 - Date: November 1981

Authors: Unknown
Publication: - Date: September 1980

Authors: Robert Morris Sr., Ken Thompson
Publication: Communications of the ACM, Volume 22, Issue 11 - Date: November 1979

Authors: Jason Gait
Publication: ACM SIGOPS Operating Systems Review, Volume 12, Number 3 - Date: July 1978

Authors: Morrie Gasser
Publication: MTR-3006, ESD-TR-75-97, AD-A017676 - Date: November 1975

Authors: George B. Purdy
Publication: Communications of the ACM, Volume 17, Number 8 - Date: August 1974

Authors: Arthur Evans, Jr., William Kantrowitz, Edwin Weiss
Publication: Communications of the ACM, Volume 17 Issue 8 - Date: August 1974






[Home] [About Us] [News] [Research]

Copyright © 2019 PasswordResearch.com