[ Publications about 'Passwords' ]
Articles in journals or book chapters (2) |
-
Marthie Grobler,
M.A.P. Chamikara,
Jacob Abbott,
Surya Nepal,
and Cecil Paris.
The Importance of Social Identity on Password Formulation.
Personal and Ubiquitous Computing,
November 2020.
Keywords: Passwords, Security, Privacy, International, Authentication. [bibtex-entry] -
Jacob Abbott and Violeta Moreno Garcia.
Password differences based on language and testing of memory recall.
NNGT International Journal of Information Security,
2:1--6,
2015.
Keywords: Passwords, Security, Usability, Authentication, International. [bibtex-entry]
Conference publications (2) |
-
Jacob Abbott,
Daniel Calarco,
and L Jean Camp.
Factors Influencing Password Reuse: A Case Study.
In TPRC46: Research Conference on Communications, Information and Internet Policy,
September 2018.
TPRC.
Keywords: Passwords, Policies. [bibtex-entry] -
L. Jean Camp,
Jacob Abbott,
and Siyu Chen.
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication.
In 2016 49th Hawaii International Conference on System Sciences (HICSS),
pages 3656--3665,
January 2016.
IEEE.
Keywords: Security, Passwords, Usability, Authentication. [bibtex-entry]
Posters and Presentations (2) |
-
L. Jean Camp Ashley Bochner, Jacob Abbott.
Potential Reuse of University Credentials.
Poster at the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021),
August 2021.
Keywords: Passwords, Security, Authentication. [bibtex-entry] -
Jacob Abbott,
Violeta Moreno,
and L. Jean Camp.
Password Differences based on Language and Testing of Memory Recall.
Annual Computer Security Applications Conference, (New Oleans, LA),
December 2014.
Keywords: Passwords, Usability, User Study. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House