Campbell et al., 2006 - Google Patents
Password composition policy: does enforcement lead to better password choices?Campbell et al., 2006
View PDF- Document ID
- 12173950514561159714
- Author
- Campbell J
- Kleeman D
- Ma W
- Publication year
- Publication venue
- ACIS 2006 Proceedings
External Links
Snippet
The primary function of access controls is to restrict the use of information systems and other computer resources to authorised users only. Although more secure alternatives exist, password-based systems remain the predominant method of user authentication. Prior …
- 239000000203 mixture 0 title abstract description 73
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Campbell et al. | Impact of restrictive composition policy on user password choices | |
Fisch et al. | Secure computers and networks: analysis, design, and implementation | |
Ciampa | A comparison of password feedback mechanisms and their impact on password entropy | |
Teimoor | A review of database security concepts, risks, and problems | |
Bryant et al. | User behaviours associated with password security and management | |
Voyiatzis et al. | An empirical study on the web password strength in Greece | |
Campbell et al. | The good and not so good of enforcing password composition rules | |
Szádeczky | Information Security Law and Strategy in Hungary | |
Shay et al. | Password policy simulation and analysis | |
Campbell et al. | Password composition policy: does enforcement lead to better password choices? | |
Hassan et al. | Data security awareness in online learning | |
Walters et al. | Assessing password threats: Implications for formulating university password policies | |
Di Campi | Password guessing: learn the nature of passwords by studying the human behavior | |
Renaud et al. | Simpass: Quantifying the impact of password behaviours and policy directives on an organisation’s systems | |
Brumen et al. | Resilience of students' passwords against attacks | |
Holt | Increasing real-world security of user IDs and passwords | |
Undale et al. | Digital Transformation and Cyber Security: Unveiling Awareness | |
Awuor | Model for security controls in web content management system | |
Sulaiman | A study on password security awareness in constructing strong passwords | |
Omollo | A Comparative Review of Business Models in Information Security | |
Al-Ammal et al. | Usability, Encryption, and the User Experience | |
Krishnan et al. | A Preliminary Study of Human Vulnerabilities in User Password Asset Management | |
Putra et al. | Constitutional Guarantees on Freedom of Expression and Its Challenges in Digital Regulation | |
Panek | Security fundamentals | |
MURPHY et al. | Survey of Search Engine Safeguards and their Applicability for AI |