How do I reset it? https://www.dropbox.com, 2015. ,
https://support.apple.com/en-us/HT201303 (2015), [Online; Accessed 15, 2016. ,
Secrets, Lies, and Account Recovery, Proceedings of the 24th International Conference on World Wide Web, WWW '15, pp.141-150, 2015. ,
DOI : 10.1093/comjnl/36.3.227
The Password Thicket: Technical and Market Failures in Human Authentication on the Web, p.WEIS, 2010. ,
Nonparametric Statistics: A Step-by-Step Approach, 2014. ,
The Anatomy Of The Twitter Attack, 2009. ,
On the (In)Security of Mobile Two-Factor Authentication, Financial Cryptography and Data Security, pp.365-383, 2014. ,
DOI : 10.1007/978-3-662-45472-5_24
A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.657-666, 2007. ,
DOI : 10.1145/1242572.1242661
On the security of trustee-based social authentications. Information Forensics and Security, IEEE Transactions on, vol.9, issue.8, pp.1251-1263, 2014. ,
Autentiza?ní metody pou?ívané k obnov? p?ihla?ovacího hesla, Czech), Masaryk University (2014), [Online; Accessed, 2016. ,
How Apple and Amazon Security Flaws Led to My Epic Hacking. http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking, 2012. ,
DOI : 10.7312/star16075-030
Personal choice and challenge questions, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009. ,
DOI : 10.1145/1572532.1572543
Online banking authentication system using mobile-OTP with QR-code, Computer Sciences and Convergence Information Technology (ICCIT) 5th International Conference on, pp.644-648, 2010. ,
A Novel User Authentication Scheme Based on QR-Code, Journal of Networks, vol.5, issue.8, pp.937-941, 2010. ,
DOI : 10.4304/jnw.5.8.937-941
URL : http://ojs.academypublisher.com/index.php/jnw/article/viewFile/0508937941/2055/
Did You Forget Your Password?, pp.29-39, 2011. ,
DOI : 10.1145/1355284.1355288
Personal knowledge questions for fallback authentication, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.13-23, 2008. ,
DOI : 10.1145/1408664.1408667
It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions, 2009 30th IEEE Symposium on Security and Privacy, pp.375-390, 2009. ,
DOI : 10.1109/SP.2009.11
It's not what you know, but who you know: a social approach to last-resort authentication, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.1983-1992, 2009. ,
DOI : 10.1145/1518701.1519003