Making Passwords Secure and Usable, Proc. HCI, pp.1-19, 1997. ,
DOI : 10.1007/978-1-4471-3601-9_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.8977
Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999. ,
DOI : 10.1145/322796.322806
Password Security: What Users Know and What They Actually Do, Usability News, vol.8, p.1, 2006. ,
Encountering stronger password requirements, Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pp.1-220, 2010. ,
DOI : 10.1145/1837110.1837113
Of passwords and people, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2595-2604, 2011. ,
DOI : 10.1145/1978942.1979321
Improving computer security for authentication of users: Influence of proactive password restrictions, Behavior Research Methods, Instruments, & Computers, vol.4, issue.2, pp.163-169, 2002. ,
DOI : 10.3758/BF03195438
Testing metrics for password creation policies by attacking large sets of revealed passwords, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.162-175, 2010. ,
DOI : 10.1145/1866307.1866327
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, 2012 IEEE Symposium on Security and Privacy, pp.538-552, 2012. ,
DOI : 10.1109/SP.2012.49