M. Burgess, How to check if your linkedin account was hacked

A. Conklin, G. Dietrich, and D. Walz, Password-based authentication: A system perspective, Proceedings of the Proceedings of the th Annual Hawaii International Conference on System Sciences (HICSS')-Track-Volume
DOI : 10.1109/hicss.2004.1265412

D. Florencio and C. Herley, A large-scale study of web password habits, Proceedings of the th international conference on the World Wide Web
DOI : 10.1145/1242572.1242661

URL : http://www2007.org/papers/paper620.pdf

S. Furnell, P. Dowland, H. Illingworth, and P. Reynolds, Authentication and supervision: A survey of user attitudes, Computers & Security (
DOI : 10.1016/s0167-4048(00)06027-2

S. Gallagher, Yahoo admits it's been hacked again, and billion accounts were exposed

A. Juels and R. L. Rivest, Honeywords: Making password-cracking detectable, Proceedings of the ACM SIGSAC Conference on Computer &#; Communications Security

J. Keane, Security researcher dumps million hacked myspace passwords online

P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas et al., Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms, IEEE Symposium on Security and Privacy
DOI : 10.1109/sp.2012.38

URL : http://doi.org/10.1109/sp.2012.38

D. Wang and P. Wang, Two birds with one stone: Two-factor authentication with security beyond conventional bound, IEEE Transactions on Dependable and Secure Computing PP
DOI : 10.1109/tdsc.2016.2605087

D. Wang, Q. Gu, H. Cheng, and P. Wang, The request for better measurement: A comparative evaluation of two-factor authentication schemes, Proceedings of the th ACM on Asia Conference on Computer and Communications Security

M. Weir, S. Aggarwal, B. D. Medeiros, and B. Glodek, Password cracking using probabilistic context-free grammars, Proceedings of the th IEEE Symposium on Security and Privacy
DOI : 10.1109/sp.2009.8