Resolving the Password Security Purgatory in the Contexts of Technology, Security and Human Factors, IEEE International Conference on Computer Applications Technology, pp.1-7, 2013. ,
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, IEEE Symposium on Security and Privacy, vol.2012, pp.538-552, 2012. ,
Understanding Passwords of Chinese Users: Characteristics, Security and Implications, pp.1-14, 2015. ,
zxcvbn: Low-Budget Password Strength Estimation, Proceedings of the 25th USENIX Security Symposium, pp.157-173, 2016. ,
Of Contrase?nas, ?,!???????? and ?????? Character Encoding Issues for wWeb Passwords, pp.1-8, 2012. ,
A Large-Scale Empirical Analysis of Chinese Web Passwords, proceedings of the 23rd USENIX Security Symposium, pp.559-574, 2014. ,
An Analysis View on Password Patterns of Chinese Internet Users, Nankai Business Review International, vol.4, issue.1, pp.66-77, 2013. ,
Targeted Online Password Guessing: An Underestimated Threat, proceedings of the 23rd ACM Conference on Computer and Communications Security, pp.1242-1254, 2016. ,
Texting Africa: Writing as Performance, Journal of Sociolinguistics, vol.17, issue.4, pp.522-546, 2013. ,
Texting and African Language Literacy, New Media & Society, vol.13, issue.3, pp.427-443, 2011. ,
An Empirical Study on the Web Password Strength in Greece, Proceedings of the 15 th Panhellenic Conference on Informatics, pp.212-216, 2011. ,
, Internet Going Mobile: Internet Access and Use in 11 African countries. Info, vol.15, pp.34-51, 2013.
Designing Password Policies for Strength and Usability, Transactions on Information and System Security, vol.4, issue.13, p.34, 2016. ,
A Socio-technical Framework for Internet-of-Things Design: A Human-centered Design for the Internet of Things, Telematics and Informatics, vol.31, pp.519-531, 2014. ,
Explaining the Dialogic Processes of Teaching and Learning: The Value and Potential of Sociocultural Theory. Learning, Culture and Social Interaction, pp.12-21, 2012. ,
Social Theory and Second Language Development, Theories in Second Language Acquisition, p.Routledge, 2015. ,
, Introducing Sociocultural Theory. Sociocultural Theory and Second Language Learning, pp.1-26, 2000.
I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab, Symposium on Usable Privacy and Security (SOUPS), pp.123-140, 2015. ,
Vygotsky's Sociocultural Theory in The Context of Globalization, Asia Pacific Journal of Education, vol.37, issue.1, pp.116-129, 2017. ,
Survival of the Shortest: A Retrospective Analysis of Influencing Factors on Password Composition, Proceedings of the International Federation for Information Conference on Human-Computer Interaction, pp.460-467, 2013. ,
, The Benefits of Understanding Passwords. Mobile Authentication, vol.2013, pp.5-24, 2013.
, Genres of Inquiry in Design-Science Research: Justification and Evaluation of Knowledge Production. Mis Quarterly, vol.39, pp.541-564, 2015.
Encountering Stronger Password Requirements: User Attitudes and Behavior, Proceedings of a Symposium on Usable Privacy and Security (SOUPS), pp.1-20, 2010. ,
Modeling the Adversary to Evaluate Password Strength With Limited Samples, pp.1-270, 2016. ,
Impact of Restrictive Composition Policy on User Password Choices, Behaviour & Information Technology, vol.30, issue.3, pp.379-388, 2011. ,
, From Very Weak to Very Strong: Analyzing PasswordStrength Meters. NDSS, vol.14, pp.23-26, 2014.
Optimizing Password Composition Policies, pp.1-27, 2013. ,
An Administrator's Guide to Internet Password Research, Proceedings of the 28th Large Installation System Administration Conference, pp.35-52, 2014. ,