Author:
McEvoy Pete,Still Jeremiah D.
Publisher
Springer International Publishing
Reference18 articles.
1. DeWitt, A.J., Kuljis, J.: Is usable security an oxymoron? Interactions 13(3), 41–44 (2006)
2. Vidyaraman, S., Chandrasekaran, M., Upadhyaya, S.: Position: the user is the enemy. In: Proceedings of the 2007 Workshop on New Security Paradigms, 75–80. ACM, New York, NY, USA (2008)
3. Forget, A., Chiasson, S., Biddle, R.: Helping users create better passwords: is this the right approach? Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 151–152. ACM, New York, NY, USA (2007)
4. Protalinski, E, Zero Day, ZDNet Security Newsletter: The top 10 passwords from the Yahoo hack: Is yours one of them? (2012). http://www.zdnet.com/article/the-top-10-passwords-from-the-yahoo-hack-is-yours-one-of-them/
5. Schneier, B.: Schneier on security: real-world passwords (2006). https://www.schneier.com/blog/archives/2006/12/realworld_passw.html
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献