default search action
Search dblp for Publications
export results for "stream:conf/passwords:"
@proceedings{DBLP:conf/passwords/2015, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29938-9}, doi = {10.1007/978-3-319-29938-9}, isbn = {978-3-319-29937-2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/AbdouBO15, author = {AbdelRahman Abdou and David Barrera and Paul C. van Oorschot}, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {What Lies Beneath? Analyzing Automated {SSH} Bruteforce Attacks}, booktitle = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, pages = {72--91}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29938-9\_6}, doi = {10.1007/978-3-319-29938-9\_6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/AbdouBO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/BuriroCFKW15, author = {Attaullah Buriro and Bruno Crispo and Filippo Del Frari and Jeffrey Klardie and Konrad S. Wrona}, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {{ITSME:} Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones}, booktitle = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, pages = {45--61}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29938-9\_4}, doi = {10.1007/978-3-319-29938-9\_4}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/BuriroCFKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/GollaD15, author = {Maximilian Golla and Markus D{\"{u}}rmuth}, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {Analyzing 4 Million Real-World Personal Knowledge Questions (Short Paper)}, booktitle = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, pages = {39--44}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29938-9\_3}, doi = {10.1007/978-3-319-29938-9\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/passwords/GollaD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/KleppmannI15, author = {Martin Kleppmann and Conrad Irwin}, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {Strengthening Public Key Authentication Against Key Theft (Short Paper)}, booktitle = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, pages = {144--150}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29938-9\_9}, doi = {10.1007/978-3-319-29938-9\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/passwords/KleppmannI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/Lancrenon15, author = {Jean Lancrenon}, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {On Password-Authenticated Key Exchange Security Modeling}, booktitle = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, pages = {120--143}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29938-9\_8}, doi = {10.1007/978-3-319-29938-9\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/Lancrenon15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/LucksW15, author = {Stefan Lucks and Jakob Wenzel}, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {Catena Variants - Different Instantiations for an Extremely Flexible Password-Hashing Framework}, booktitle = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, pages = {95--119}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29938-9\_7}, doi = {10.1007/978-3-319-29938-9\_7}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/passwords/LucksW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/ParkinDKS15, author = {Simon E. Parkin and Samy Driss and Kat Krol and M. Angela Sasse}, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {Assessing the User Experience of Password Reset Policies in a University}, booktitle = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, pages = {21--38}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29938-9\_2}, doi = {10.1007/978-3-319-29938-9\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/ParkinDKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/SiadatiNM15, author = {Hossein Siadati and Toan Nguyen and Nasir D. Memon}, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {Verification Code Forwarding Attack (Short Paper)}, booktitle = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, pages = {65--71}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29938-9\_5}, doi = {10.1007/978-3-319-29938-9\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/passwords/SiadatiNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/StobertB15, author = {Elizabeth Stobert and Robert Biddle}, editor = {Frank Stajano and Stig Fr. Mj{\o}lsnes and Graeme Jenkinson and Per Thorsheim}, title = {Expert Password Management}, booktitle = {Technology and Practice of Passwords - 9th International Conference, {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9551}, pages = {3--20}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29938-9\_1}, doi = {10.1007/978-3-319-29938-9\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/StobertB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/passwords/2014, editor = {Stig Fr. Mj{\o}lsnes}, title = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24192-0}, doi = {10.1007/978-3-319-24192-0}, isbn = {978-3-319-24191-3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/BicakciS14, author = {Kemal Bicakci and Tashtanbek Satiev}, editor = {Stig Fr. Mj{\o}lsnes}, title = {charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {74--86}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_5}, doi = {10.1007/978-3-319-24192-0\_5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/BicakciS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/ChangJMS14, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, editor = {Stig Fr. Mj{\o}lsnes}, title = {Cryptographic Module Based Approach for Password Hashing Schemes}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {39--57}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_3}, doi = {10.1007/978-3-319-24192-0\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/ChangJMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/DurmuthK14, author = {Markus D{\"{u}}rmuth and Thorsten Kranz}, editor = {Stig Fr. Mj{\o}lsnes}, title = {On Password Guessing with GPUs and FPGAs}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {19--38}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_2}, doi = {10.1007/978-3-319-24192-0\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/DurmuthK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/ForlerLLW14, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, editor = {Stig Fr. Mj{\o}lsnes}, title = {Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {3--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_1}, doi = {10.1007/978-3-319-24192-0\_1}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/passwords/ForlerLLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/JaegerGS0M14, author = {David Jaeger and Hendrik Graupner and Andrey Sapegin and Feng Cheng and Christoph Meinel}, editor = {Stig Fr. Mj{\o}lsnes}, title = {Gathering and Analyzing Identity Leaks for Security Awareness}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {102--115}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_7}, doi = {10.1007/978-3-319-24192-0\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/JaegerGS0M14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/KumarL14, author = {Amrit Kumar and C{\'{e}}dric Lauradoux}, editor = {Stig Fr. Mj{\o}lsnes}, title = {Private Password Auditing - Short Paper}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {138--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_9}, doi = {10.1007/978-3-319-24192-0\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/KumarL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/MillicanS14, author = {Jonathan Millican and Frank Stajano}, editor = {Stig Fr. Mj{\o}lsnes}, title = {SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper)}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {146--152}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_10}, doi = {10.1007/978-3-319-24192-0\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/MillicanS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/SandvollBL14, author = {Mats Sandvoll and Colin Boyd and Bj{\o}rn B. Larsen}, editor = {Stig Fr. Mj{\o}lsnes}, title = {PassCue: The Shared Cues System in Practice}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {119--137}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_8}, doi = {10.1007/978-3-319-24192-0\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/SandvollBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/StajanoSJS14, author = {Frank Stajano and Max Spencer and Graeme Jenkinson and Quentin Stafford{-}Fraser}, editor = {Stig Fr. Mj{\o}lsnes}, title = {Password-Manager Friendly {(PMF):} Semantic Annotations to Improve the Effectiveness of Password Managers}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {61--73}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_4}, doi = {10.1007/978-3-319-24192-0\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/StajanoSJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/TihanyiKVL14, author = {Norbert Tihanyi and Attila Kov{\'{a}}cs and Gergely Vargha and {\'{A}}d{\'{a}}m L{\'{e}}n{\'{a}}rt}, editor = {Stig Fr. Mj{\o}lsnes}, title = {Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {89--101}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_6}, doi = {10.1007/978-3-319-24192-0\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/passwords/TihanyiKVL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.