31 papers:
- CHI-2015-Al-AmeenWS #multi #random #towards
- Towards Making Random Passwords Memorable: Leveraging Users’ Cognitive Ability Through Multiple Cues (MNAA, MKW, SS), pp. 2315–2324.
- CHI-2015-DandapatPMCG #named #process
- ActivPass: Your Daily Activity is Your Password (SKD, SP, BM, RRC, NG), pp. 2325–2334.
- CHI-2015-ShayBCCFKMMSU #behaviour #feedback
- A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior (RS, LB, NC, LFC, AF, SK, MLM, WM, SMS, BU), pp. 2903–2912.
- CHI-2014-ShayKDHMSUBCC #question
- Can long passwords be secure and usable? (RS, SK, ALD, P(H, MLM, SMS, BU, LB, NC, LFC), pp. 2927–2936.
- CHI-2014-ThorpeAMS #visual notation
- The presentation effect on graphical passwords (JT, MAB, BM, ASA), pp. 2947–2950.
- CHI-2013-Egelman #exclamation #facebook #privacy #trade-off #verification
- My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect (SE), pp. 2369–2378.
- CHI-2013-EgelmanSMBH
- Does my password go up to eleven?: the impact of password meters on password selection (SE, AS, IM, KB, CH), pp. 2379–2388.
- CHI-2013-LucaZPH #using
- Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
- HIMI-D-2013-VuH #memory management #strict
- The Influence of Password Restrictions and Mnemonics on the Memory for Passwords of Older Adults (KPLV, MMH), pp. 660–668.
- CHI-2012-BullingAS #security #using #visual notation
- Increasing the security of gaze-based cued-recall graphical passwords using saliency masks (AB, FA, AS), pp. 3011–3020.
- LICS-2012-Levin #internet #what
- Turing’s Password: What Internet Cannot Leak (LAL), p. 11.
- CHI-2011-DenningBDJ #memory management
- Exploring implicit memory for painless password recovery (TD, KDB, MvD, AJ), pp. 2615–2618.
- CHI-2011-HayashiH
- A diary study of password usage in daily life (EH, JIH), pp. 2627–2630.
- CHI-2011-Kaye #self
- Self-reported password sharing strategies (JK), pp. 2619–2622.
- CHI-2011-KomanduriSKMBCCE #people #policy
- Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
- DUXU-v2-2011-Moallem #question
- Did You Forget Your Password? (AM), pp. 29–39.
- HIMI-v1-2011-NamPKLW #authentication
- Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group (JN, JP, JK, YL, DW), pp. 339–348.
- CHI-2010-BianchiOK
- The secure haptic keypad: a tactile password system (AB, IO, DSK), pp. 1089–1092.
- CHI-2010-ForgetCB #visual notation
- Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords (AF, SC, RB), pp. 1107–1110.
- CHI-2010-InglesantS #cost analysis #policy
- The true cost of unusable password policies: password use in the wild (PI, MAS), pp. 383–392.
- SAC-2010-LarcherBM #embedded #recognition
- Constrained Viterbi decoding for embedded user-customised password speaker recognition (AL, JFB, JSDM), pp. 1501–1502.
- CHI-2009-EverittBFK #multi #visual notation
- A comprehensive study of frequency, interference, and training of multiple graphical passwords (KE, TB, JF, TK), pp. 889–898.
- HIMI-DIE-2009-NelsonV #self
- Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords (DN, KPLV), pp. 693–701.
- SEKE-2009-KulkarniCZ #framework #monitoring #named #online #policy
- iPass: An Integrated Framework for Educating, Monitoring and Enforcing Password Policies for Online Services (DK, DC, FZ), pp. 548–551.
- ICALP-C-2008-KolesnikovR #authentication
- Password Mistyping in Two-Factor-Authenticated Key Exchange (VK, CR), pp. 702–714.
- ICPR-2008-OkaKXLW #authentication #named #similarity #sketching #using
- Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
- CHI-2007-MoncurL #multi #usability #visual notation
- Pictures at the ATM: exploring the usability of multiple graphical passwords (WM, GL), pp. 887–894.
- CHI-2007-SinghCDAF #design #security #social
- Password sharing: implications for security design based on social practice (SS, AC, CD, GA, MF), pp. 895–904.
- SAC-2007-TopkaraAT #multi #word
- Passwords decay, words endure: secure and re-usable multiple password mnemonics (UT, MJA, MT), pp. 292–299.
- ICALP-2005-AbadiW #encryption
- Password-Based Encryption Analyzed (MA, BW), pp. 664–676.
- HPDC-2005-SacerdotiKP #scalability
- 411 on scalable password service (FDS, MJK, PMP), pp. 211–221.