Documents Related by Co-Citation

208 Password Security: A Case History – Robert Morris, Ken Thompson - 1979
130 "Foiling the Cracker": A Survey of, and Improvements to, Password Security – Daniel V. Klein - 1990
175 The secure remote password protocol – Thomas Wu - 1998
163 Deja Vu: A User Study Using Images for Authentication – Rachna Dhamija, Adrian Perrig
54 A Convenient Method for Securely Managing Passwords – J. Alex Halderman, Brent Waters, Edward W. Felten - 2005
163 Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish – B. Schneier - 1994
147 The Design and Analysis of Graphical Passwords – Aviel D. Rubin, Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter - 1999
819 The MD5 message-digest algorithm – R Rivest - 1992
107 A Large-Scale Study of Web Password Habits – D Florêncio, C Herley - 2007
60 Making a faster cryptanalytic time-memory trade-off – P Oechslin - 2003
35 Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff – Arvind Narayanan - 2005
22 Secure Applications of Low-Entropy Keys – John Kelsey , Bruce Schneier, Chris Hall, David Wagner - 1998
30 Electronic Authentication Guideline – William E. Burr, Donna F. Dodson, W. Timothy Polk, Donald L. Evans - 2004
5 STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS – Colin Percival
134 Stronger Password Authentication Using Browser Extensions – Blake Ross, Collin Jackson, Nicholas Miyake, Dan Boneh, John C Mitchell - 2005
1425 Security Architecture for the Internet Protocol – Randall Atkinson - 1995
76 Securing Passwords Against Dictionary Attacks – Benny Pinkas, Tomas Sander - 2002
25 Picture Password: A Visual Login Technique for Mobile Devices,” 2003, available at: >, Last Visited 8 – W Jansen, S Gavrila, V Korolev, R Ayers, R Swanstrom - 2007
86 PassPoints: Design and longitudinal evaluation of a graphical password system – Susan Wiedenbeck , Jim Waters , Jean-camille Birget , Alex Brodskiy , Nasir Memon - 2005