BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
secur (6)
graphic (5)
base (4)
multipl (4)
use (4)

Stem password$ (all stems)

31 papers:

CHICHI-2015-Al-AmeenWS #multi #random #towards
Towards Making Random Passwords Memorable: Leveraging Users’ Cognitive Ability Through Multiple Cues (MNAA, MKW, SS), pp. 2315–2324.
CHICHI-2015-DandapatPMCG #named #process
ActivPass: Your Daily Activity is Your Password (SKD, SP, BM, RRC, NG), pp. 2325–2334.
CHICHI-2015-ShayBCCFKMMSU #behaviour #feedback
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior (RS, LB, NC, LFC, AF, SK, MLM, WM, SMS, BU), pp. 2903–2912.
CHICHI-2014-ShayKDHMSUBCC #question
Can long passwords be secure and usable? (RS, SK, ALD, P(H, MLM, SMS, BU, LB, NC, LFC), pp. 2927–2936.
CHICHI-2014-ThorpeAMS #visual notation
The presentation effect on graphical passwords (JT, MAB, BM, ASA), pp. 2947–2950.
CHICHI-2013-Egelman #exclamation #facebook #privacy #trade-off #verification
My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect (SE), pp. 2369–2378.
Does my password go up to eleven?: the impact of password meters on password selection (SE, AS, IM, KB, CH), pp. 2379–2388.
CHICHI-2013-LucaZPH #using
Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
HCIHIMI-D-2013-VuH #memory management #strict
The Influence of Password Restrictions and Mnemonics on the Memory for Passwords of Older Adults (KPLV, MMH), pp. 660–668.
CHICHI-2012-BullingAS #security #using #visual notation
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks (AB, FA, AS), pp. 3011–3020.
LICSLICS-2012-Levin #internet #what
Turing’s Password: What Internet Cannot Leak (LAL), p. 11.
CHICHI-2011-DenningBDJ #memory management
Exploring implicit memory for painless password recovery (TD, KDB, MvD, AJ), pp. 2615–2618.
A diary study of password usage in daily life (EH, JIH), pp. 2627–2630.
CHICHI-2011-Kaye #self
Self-reported password sharing strategies (JK), pp. 2619–2622.
CHICHI-2011-KomanduriSKMBCCE #people #policy
Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
HCIDUXU-v2-2011-Moallem #question
Did You Forget Your Password? (AM), pp. 29–39.
HCIHIMI-v1-2011-NamPKLW #authentication
Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group (JN, JP, JK, YL, DW), pp. 339–348.
The secure haptic keypad: a tactile password system (AB, IO, DSK), pp. 1089–1092.
CHICHI-2010-ForgetCB #visual notation
Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords (AF, SC, RB), pp. 1107–1110.
CHICHI-2010-InglesantS #cost analysis #policy
The true cost of unusable password policies: password use in the wild (PI, MAS), pp. 383–392.
SACSAC-2010-LarcherBM #embedded #recognition
Constrained Viterbi decoding for embedded user-customised password speaker recognition (AL, JFB, JSDM), pp. 1501–1502.
CHICHI-2009-EverittBFK #multi #visual notation
A comprehensive study of frequency, interference, and training of multiple graphical passwords (KE, TB, JF, TK), pp. 889–898.
HCIHIMI-DIE-2009-NelsonV #self
Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords (DN, KPLV), pp. 693–701.
SEKESEKE-2009-KulkarniCZ #framework #monitoring #named #online #policy
iPass: An Integrated Framework for Educating, Monitoring and Enforcing Password Policies for Online Services (DK, DC, FZ), pp. 548–551.
ICALPICALP-C-2008-KolesnikovR #authentication
Password Mistyping in Two-Factor-Authenticated Key Exchange (VK, CR), pp. 702–714.
ICPRICPR-2008-OkaKXLW #authentication #named #similarity #sketching #using
Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
CHICHI-2007-MoncurL #multi #usability #visual notation
Pictures at the ATM: exploring the usability of multiple graphical passwords (WM, GL), pp. 887–894.
CHICHI-2007-SinghCDAF #design #security #social
Password sharing: implications for security design based on social practice (SS, AC, CD, GA, MF), pp. 895–904.
SACSAC-2007-TopkaraAT #multi #word
Passwords decay, words endure: secure and re-usable multiple password mnemonics (UT, MJA, MT), pp. 292–299.
ICALPICALP-2005-AbadiW #encryption
Password-Based Encryption Analyzed (MA, BW), pp. 664–676.
HPDCHPDC-2005-SacerdotiKP #scalability
411 on scalable password service (FDS, MJK, PMP), pp. 211–221.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.