Author:
Jakobsson Markus,Stolterman Erik,Wetzel Susanne,Yang Liu
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures;Detection of Intrusions and Malware, and Vulnerability Assessment;2021
2. User Account Access Graphs;Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security;2019-11-06
3. Analyzing 4 Million Real-World Personal Knowledge Questions (Short Paper);Technology and Practice of Passwords;2016
4. Locked Your Phone? Buy a New One? From Tales of Fallback Authentication on Smartphones to Actual Concepts;Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services;2015-08-24
5. Secrets, Lies, and Account Recovery;Proceedings of the 24th International Conference on World Wide Web;2015-05-18