Cognitive password

Results: 44



#Item
11Password / Draw a Secret / Phishing / Partial Password / Cognitive password / Security / Access control / Computer security

Exploring the Design Space of Graphical Passwords on Smartphones Florian Schaub, Marcel Walch, Bastian Könings, and Michael Weber Institute of Media Informatics Ulm UniversityUlm, Germany

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-03 09:36:38
12Password / Recall / John the Ripper / Cognitive password / Password policy / Security / Computer security / Cryptography

Memory Retrieval and Graphical Passwords Elizabeth Stobert School of Computer Science Carleton University Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-03 09:36:38
13Cryptography / Password / Crypt / John the Ripper / Password policy / Cognitive password / Computer security / Security / Access control

Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman1 , Andreas Sotirakopoulos2 , Ildar Muslukhov2 , Konstantin Beznosov2 , and Cormac Herley3 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-04-29 12:12:39
14Cyberwarfare / Password / Passphrase / Cognitive password / Password strength / Random password generator / Security / Cryptography / Computer security

Text Passwords Sasha Romanosky March 30, 2006 Mind Map

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-04-17 22:04:01
15Cyberwarfare / Password / Computer crimes / Passphrase / John the Ripper / Phishing / Crypt / Password policy / Cognitive password / Computer security / Security / Cryptography

Text Entry Method Affects Password Security Yulong Yang† , Janne Lindqvist† , Antti Oulasvirta‡ † Rutgers University, ‡ Aalto University Abstract Background. Text-based passwords continue to be the

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-21 23:17:08
16Cyberwarfare / Password / Password policy / Cognitive password / Security / Computer security / Cryptography

A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek* , William Mel

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2015-01-08 09:25:07
17Internet protocols / Challenge-response authentication / Authentication / Password authentication protocol / Password / Security / Cryptography / Computer security

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) Philippe Golle Palo Alto Research Center [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-03-09 13:40:40
18Distracted driving / Windows XP / Password / Dispatch

Distracted Driving Solution By limiting the functionality of in-vehicle computers whilst the vehicle is moving, Blank-IT reduces visual, cognitive and physical distraction, improving employee safety while potentially red

Add to Reading List

Source URL: www.blank-it.com

Language: English - Date: 2013-10-24 20:36:36
19Mental processes / Computer network security / Access control / Authentication / Notary / Packaging / Password / Challenge-response authentication / Security token / Mind / Cognitive science / Security

Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks Hristo Bojinov Daniel Sanchez, Paul Reber Stanford University Northwestern University

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-21 17:34:34
20Dementia / Aging-associated diseases / Cognitive disorders / Password

SNIPPETS September 2013 Seniors Enquiry Line Linking Seniors with Community Informaon

Add to Reading List

Source URL: www.seniorsenquiryline.com.au

Language: English
UPDATE