Cryptography Reference
In-Depth Information
2. Halderman, A., Waters, B., Felten, E.: A convenient method for securely managing pass-
words. In: Proceedings of the 2005 World Wide Web Conference, Chiba, Japan, pp. 471-479
(May 2005)
3. Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22(11), 594-
597 (1979)
4. Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: Em-
pirical results. IEEE Security and Privacy 2(5), 25-31 (2004)
5. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40-46 (1999)
6. Siber Systems. Roboform password manager (2009), http://www.roboform.com
7. LastPass. Lastpass password manager (2009), https://lastpass.com
8. Mozilla Labs. Weave sync (2009), http://labs.mozilla.com/projects/weave
9. Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentica-
tion using browser extensions. In: USENIX Security Symposium (2005)
10. Reichl, D.: Keepassmobile (2009), http://www.keepassmobile.com
11. Openintents safe (2009), http://www.openintents.org/en/node/205
12. Sonia Chiasson, P., van Oorschot, C., Biddle, R.: A usability study and critique of two pass-
word managers. In: USENIX Security Symposium (2006)
13. Dhamija, R., Dusseault, L.: The seven flaws of identity management: Usability and security
challenges. IEEE Security and Privacy (2008)
14. Handypassword,
http://www.handypassword.com/login password manager terms/
usb password manager.shtml
15. Pc magazine: Password managers & form fillers,
http://www.pcmag.com/article2/0,2817,1791459,00.asp
16. Password management software review (2009),
http://password-management-software-review.toptenreviews.com/
17. Imation 2gb usb thumb drive: Specifications,
http://www.pcmall.com/p/Imation-Removable-Hard-Drives/
productdpno517643pdp.cggiicj
18. Nokia 5310 mobile phone: Specifications,
http://europe.nokia.com/find-products/
devices/nokia-5310-xpressmusic
19. Browser statistics,
http://www.w3schools.com/browsers/browsers_stats.asp
20. Schechter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The emperor's new security indicators.
In: IEEE Symposium on Security and Privacy (2007)
21. Cohen, J., Cohen, P., West, S.G., Aiken, L.S.: Applied multiple regression/correlation analy-
sis for the behavioral sciences (1983)
22. Frokjaer, E., Hertzum, M., Hornbaek, K.: Measuring usability: are effectiveness, efficiency,
and satisfaction really correlated. In: SIGCHI Conference on Human Factors in Computing
Systems (2000)
23. Kaiser, H.F.: The application of electronic computers to factor analysis. Educational and
Psychological Measurement 20(1), 141-151 (1960)
 
Search WWH ::




Custom Search