References
- Bellovin , S. 2008 . Security by checklist . IEEE Security and Privacy , 6 ( 2 ) : 88 doi: doi:10.1109/MSP.2008.43
- Bonneau , J. and Preibusch , S. 2010 . The password thicket: Technical and market failures in human authentication on the Web . Workshop on Economics of Information Security ,
- Bradley, T. (2010). Creating secure passwords—Tips for creating strong passwords you can remember, About.com. http://netsecurity.about.com/cs/generalsecurity/a/aa112103b. htm (http://netsecurity.about.com/cs/generalsecurity/a/aa112103b. htm)
- Eston, T. (2010, October 30). Social networks' threat to security: Weak passwords and insecure personal information could put your company's data at risk, InformationWeek. http://www.informationweek.com/news/security/vulnerabilities/ showArticle.jhtml?articleID=228000268&queryText=password (http://www.informationweek.com/news/security/vulnerabilities/ showArticle.jhtml?articleID=228000268&queryText=password)
- Flatley, J. (2010, August 16). GPUs democratize brute force password hacking, Engafget. http://www.engadget.com/2010/08/16/gpus-democratize-brute-force-password-hacking/ (http://www.engadget.com/2010/08/16/gpus-democratize-brute-force-password-hacking/)
- Florencio , D. and Herley , C. A large-scale study of web password habits . Proceedings of the 16th International Conference on World Wide Web . Banff, Alberta, Canada. May 8–12 . doi: doi: 10.1145/1242572.1242661
- Gibson, S. (2010, May). Perfect passwords—GRC's ultra high security password generator. https://www.grc.com/passwords.htm (http://https://www.grc.com/passwords.htm)
- Klein , D. 1990 . Foiling the cracker: A survey of, and improvements to, password security 5 – 1 . 2nd USENIX Unix Security Workshop, Usenix
- Oltsik, J. (2009). Identity and information security integration. White Paper, Enterprise Strategy Group. http://www.rsa. com/products/cleartrust/whitepapers/10404_ESG_WP_0909.pdf (http://www.rsa. com/products/cleartrust/whitepapers/10404_ESG_WP_0909.pdf)
- Scalet, S. (2005, December). How to write good passwords—A good password isn't a password at all. Instead, it's a system for creating codes that are easy to remember but hard to crack. CSO Online. http://www.csoonline.com/article/220721/how-to-write-good-passwords?page=1 (http://www.csoonline.com/article/220721/how-to-write-good-passwords?page=1)
- Schneier, B. (2006, December). MySpace passwords aren't so dumb. Wired News. http://www.schneier.com/essay-144.html (http://www.schneier.com/essay-144.html)
- Schneier , B. 2000 . Secrets & lies: Digital security in a networked world , New York : Wiley & Sons .
- Vance , A. 2010 . If your password is 123456, just make it HackMe . New York Times , January 20 : A1
- Van Oorschot , P. and Stubblebine , S. 2006 . On countering online dictionary attacks with login histories and humans-in-the-loop . ACM Transactions on Information and System Security (TISSEC) , 9 ( 3 ) : 235 – 258 . doi: doi: 10.1145/1178618.1178619
- Yan , J. , Blackwell , A. , Anderson , R. and Grant , A. 2004 . Password memorability and security: Empirical results . IEEE Security and Privacy , 2 ( 5 ) : 25 – 31 .
- Yoichi , S. December 2002 . Development of personal authentication systems using fingerprint with smart cards and digital signature technologies. ICARCV'02 , December , 996 – 1001 . GMU ACM/IEEE Digital Libraries .