Search dblp for Publications

export results for "toc:db/conf/passwords/passwords2015.bht:"

 download as .bib file

@proceedings{DBLP:conf/passwords/2015,
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29938-9},
  doi          = {10.1007/978-3-319-29938-9},
  isbn         = {978-3-319-29937-2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/passwords/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/AbdouBO15,
  author       = {AbdelRahman Abdou and
                  David Barrera and
                  Paul C. van Oorschot},
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {What Lies Beneath? Analyzing Automated {SSH} Bruteforce Attacks},
  booktitle    = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  pages        = {72--91},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29938-9\_6},
  doi          = {10.1007/978-3-319-29938-9\_6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/passwords/AbdouBO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/BuriroCFKW15,
  author       = {Attaullah Buriro and
                  Bruno Crispo and
                  Filippo Del Frari and
                  Jeffrey Klardie and
                  Konrad S. Wrona},
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {{ITSME:} Multi-modal and Unobtrusive Behavioural User Authentication
                  for Smartphones},
  booktitle    = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  pages        = {45--61},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29938-9\_4},
  doi          = {10.1007/978-3-319-29938-9\_4},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/passwords/BuriroCFKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/GollaD15,
  author       = {Maximilian Golla and
                  Markus D{\"{u}}rmuth},
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {Analyzing 4 Million Real-World Personal Knowledge Questions (Short
                  Paper)},
  booktitle    = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  pages        = {39--44},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29938-9\_3},
  doi          = {10.1007/978-3-319-29938-9\_3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/passwords/GollaD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/KleppmannI15,
  author       = {Martin Kleppmann and
                  Conrad Irwin},
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {Strengthening Public Key Authentication Against Key Theft (Short Paper)},
  booktitle    = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  pages        = {144--150},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29938-9\_9},
  doi          = {10.1007/978-3-319-29938-9\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/passwords/KleppmannI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/Lancrenon15,
  author       = {Jean Lancrenon},
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {On Password-Authenticated Key Exchange Security Modeling},
  booktitle    = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  pages        = {120--143},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29938-9\_8},
  doi          = {10.1007/978-3-319-29938-9\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/passwords/Lancrenon15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/LucksW15,
  author       = {Stefan Lucks and
                  Jakob Wenzel},
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {Catena Variants - Different Instantiations for an Extremely Flexible
                  Password-Hashing Framework},
  booktitle    = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  pages        = {95--119},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29938-9\_7},
  doi          = {10.1007/978-3-319-29938-9\_7},
  timestamp    = {Thu, 21 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/passwords/LucksW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/ParkinDKS15,
  author       = {Simon E. Parkin and
                  Samy Driss and
                  Kat Krol and
                  M. Angela Sasse},
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {Assessing the User Experience of Password Reset Policies in a University},
  booktitle    = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29938-9\_2},
  doi          = {10.1007/978-3-319-29938-9\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/passwords/ParkinDKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/SiadatiNM15,
  author       = {Hossein Siadati and
                  Toan Nguyen and
                  Nasir D. Memon},
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {Verification Code Forwarding Attack (Short Paper)},
  booktitle    = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  pages        = {65--71},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29938-9\_5},
  doi          = {10.1007/978-3-319-29938-9\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/passwords/SiadatiNM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/StobertB15,
  author       = {Elizabeth Stobert and
                  Robert Biddle},
  editor       = {Frank Stajano and
                  Stig Fr. Mj{\o}lsnes and
                  Graeme Jenkinson and
                  Per Thorsheim},
  title        = {Expert Password Management},
  booktitle    = {Technology and Practice of Passwords - 9th International Conference,
                  {PASSWORDS} 2015, Cambridge, UK, December 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9551},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29938-9\_1},
  doi          = {10.1007/978-3-319-29938-9\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/passwords/StobertB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}