Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Passwords). Showing records 1 – 30 of 56 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Levels

▼ Search Limiters

1. al-Khateeb, Haider. Security and usability in click-based authentication systems.

Degree: PhD, 2011, University of Bedfordshire

 Web applications widely use text passwords to confirm people‟s identity. However, investigations reveal text passwords have many problems and that there is a need for… (more)

Subjects/Keywords: 005.8; passwords; computer security; visual passwords

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

al-Khateeb, H. (2011). Security and usability in click-based authentication systems. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/142229

Chicago Manual of Style (16th Edition):

al-Khateeb, Haider. “Security and usability in click-based authentication systems.” 2011. Doctoral Dissertation, University of Bedfordshire. Accessed October 17, 2019. http://hdl.handle.net/10547/142229.

MLA Handbook (7th Edition):

al-Khateeb, Haider. “Security and usability in click-based authentication systems.” 2011. Web. 17 Oct 2019.

Vancouver:

al-Khateeb H. Security and usability in click-based authentication systems. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2011. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10547/142229.

Council of Science Editors:

al-Khateeb H. Security and usability in click-based authentication systems. [Doctoral Dissertation]. University of Bedfordshire; 2011. Available from: http://hdl.handle.net/10547/142229


University of Cambridge

2. Bonneau, Joseph. Guessing human-chosen secrets.

Degree: PhD, 2012, University of Cambridge

 Authenticating humans to computers remains a notable weak point in computer security despite decades of effort. Although the security research community has explored dozens of… (more)

Subjects/Keywords: 005.8; Passwords; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bonneau, J. (2012). Guessing human-chosen secrets. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189

Chicago Manual of Style (16th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets.” 2012. Doctoral Dissertation, University of Cambridge. Accessed October 17, 2019. https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189.

MLA Handbook (7th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets.” 2012. Web. 17 Oct 2019.

Vancouver:

Bonneau J. Guessing human-chosen secrets. [Internet] [Doctoral dissertation]. University of Cambridge; 2012. [cited 2019 Oct 17]. Available from: https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189.

Council of Science Editors:

Bonneau J. Guessing human-chosen secrets. [Doctoral Dissertation]. University of Cambridge; 2012. Available from: https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189


Delft University of Technology

3. Cordeiro, S.L.G. Gesture based password authentication for mobile consumer devices:.

Degree: 2011, Delft University of Technology

 Signet has two core components that aim at supporting the user in making safe and diverse password choices. By choosing image hints automatically, the user… (more)

Subjects/Keywords: passwords; authentication; gesture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cordeiro, S. L. G. (2011). Gesture based password authentication for mobile consumer devices:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:1528faac-1a66-4d7d-8afe-b14e1c539213

Chicago Manual of Style (16th Edition):

Cordeiro, S L G. “Gesture based password authentication for mobile consumer devices:.” 2011. Masters Thesis, Delft University of Technology. Accessed October 17, 2019. http://resolver.tudelft.nl/uuid:1528faac-1a66-4d7d-8afe-b14e1c539213.

MLA Handbook (7th Edition):

Cordeiro, S L G. “Gesture based password authentication for mobile consumer devices:.” 2011. Web. 17 Oct 2019.

Vancouver:

Cordeiro SLG. Gesture based password authentication for mobile consumer devices:. [Internet] [Masters thesis]. Delft University of Technology; 2011. [cited 2019 Oct 17]. Available from: http://resolver.tudelft.nl/uuid:1528faac-1a66-4d7d-8afe-b14e1c539213.

Council of Science Editors:

Cordeiro SLG. Gesture based password authentication for mobile consumer devices:. [Masters Thesis]. Delft University of Technology; 2011. Available from: http://resolver.tudelft.nl/uuid:1528faac-1a66-4d7d-8afe-b14e1c539213


Oklahoma State University

4. Kancharlapalli, Sunil. Smartpass: a New Authentication Scheme Using Geolocation.

Degree: Computer Science, 2014, Oklahoma State University

 Authentication is critical in today's digital world. Everything from e-mail access to e-commerce to online banking requires users to authenticate themselves. The most common form… (more)

Subjects/Keywords: authentication; passwords; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kancharlapalli, S. (2014). Smartpass: a New Authentication Scheme Using Geolocation. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/14926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kancharlapalli, Sunil. “Smartpass: a New Authentication Scheme Using Geolocation.” 2014. Thesis, Oklahoma State University. Accessed October 17, 2019. http://hdl.handle.net/11244/14926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kancharlapalli, Sunil. “Smartpass: a New Authentication Scheme Using Geolocation.” 2014. Web. 17 Oct 2019.

Vancouver:

Kancharlapalli S. Smartpass: a New Authentication Scheme Using Geolocation. [Internet] [Thesis]. Oklahoma State University; 2014. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/11244/14926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kancharlapalli S. Smartpass: a New Authentication Scheme Using Geolocation. [Thesis]. Oklahoma State University; 2014. Available from: http://hdl.handle.net/11244/14926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

5. Veras Guimaraes, Rafael. An investigation of semantic patterns in passwords.

Degree: 2013, University of Ontario Institute of Technology

 The advent of large password leaks in recent years has exposed the security problems of passwords and enabled deeper empirical investigation of password patterns. Researchers… (more)

Subjects/Keywords: Security; Passwords; Authentication; Semantics; Guessing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Veras Guimaraes, R. (2013). An investigation of semantic patterns in passwords. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Veras Guimaraes, Rafael. “An investigation of semantic patterns in passwords.” 2013. Thesis, University of Ontario Institute of Technology. Accessed October 17, 2019. http://hdl.handle.net/10155/331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Veras Guimaraes, Rafael. “An investigation of semantic patterns in passwords.” 2013. Web. 17 Oct 2019.

Vancouver:

Veras Guimaraes R. An investigation of semantic patterns in passwords. [Internet] [Thesis]. University of Ontario Institute of Technology; 2013. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10155/331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Veras Guimaraes R. An investigation of semantic patterns in passwords. [Thesis]. University of Ontario Institute of Technology; 2013. Available from: http://hdl.handle.net/10155/331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

6. MacRae, Brent Alexander. Strategies and applications for creating more memorable passwords.

Degree: 2016, University of Ontario Institute of Technology

 As we continue to learn and grow in an ever evolving technological age, we deepen our understanding of the importance of authentication. There are many… (more)

Subjects/Keywords: Passwords; Authentication; Memorability; Security; Usability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MacRae, B. A. (2016). Strategies and applications for creating more memorable passwords. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/876

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

MacRae, Brent Alexander. “Strategies and applications for creating more memorable passwords.” 2016. Thesis, University of Ontario Institute of Technology. Accessed October 17, 2019. http://hdl.handle.net/10155/876.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

MacRae, Brent Alexander. “Strategies and applications for creating more memorable passwords.” 2016. Web. 17 Oct 2019.

Vancouver:

MacRae BA. Strategies and applications for creating more memorable passwords. [Internet] [Thesis]. University of Ontario Institute of Technology; 2016. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10155/876.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

MacRae BA. Strategies and applications for creating more memorable passwords. [Thesis]. University of Ontario Institute of Technology; 2016. Available from: http://hdl.handle.net/10155/876

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

7. Maraj, Amit. Do extroverts create stronger passwords?.

Degree: 2018, University of Ontario Institute of Technology

 We investigate the relationship between personality types and the strength of created and selected passwords. For this purpose, we conducted an experiment on Amazon???s Mechanical… (more)

Subjects/Keywords: Passwords; Personality; Personalities; Password; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maraj, A. (2018). Do extroverts create stronger passwords?. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/917

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Maraj, Amit. “Do extroverts create stronger passwords?.” 2018. Thesis, University of Ontario Institute of Technology. Accessed October 17, 2019. http://hdl.handle.net/10155/917.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Maraj, Amit. “Do extroverts create stronger passwords?.” 2018. Web. 17 Oct 2019.

Vancouver:

Maraj A. Do extroverts create stronger passwords?. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10155/917.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Maraj A. Do extroverts create stronger passwords?. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/917

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Major, George S. Analyzing Breach Data to Uncover Student Exposure & Password Trends.

Degree: 2018, Ferris State University

 This study attempted to quantify the data breach exposure of students at select universities in Michigan, and to analyze their password creation behavior. A large,… (more)

Subjects/Keywords: Computer passwords.; Information security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Major, G. S. (2018). Analyzing Breach Data to Uncover Student Exposure & Password Trends. (Thesis). Ferris State University. Retrieved from http://hdl.handle.net/2323/6375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Major, George S. “Analyzing Breach Data to Uncover Student Exposure & Password Trends.” 2018. Thesis, Ferris State University. Accessed October 17, 2019. http://hdl.handle.net/2323/6375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Major, George S. “Analyzing Breach Data to Uncover Student Exposure & Password Trends.” 2018. Web. 17 Oct 2019.

Vancouver:

Major GS. Analyzing Breach Data to Uncover Student Exposure & Password Trends. [Internet] [Thesis]. Ferris State University; 2018. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/2323/6375.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Major GS. Analyzing Breach Data to Uncover Student Exposure & Password Trends. [Thesis]. Ferris State University; 2018. Available from: http://hdl.handle.net/2323/6375

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Plymouth

9. Jali, Mohd Zalisham. A study of graphical alternatives for user authentication.

Degree: PhD, 2011, University of Plymouth

 Authenticating users by means of passwords is still the dominant form of authentication despite its recognised weaknesses. To solve this, authenticating users with images or… (more)

Subjects/Keywords: 300.285; Graphical passwords, Authentication, Usable security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jali, M. Z. (2011). A study of graphical alternatives for user authentication. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/881

Chicago Manual of Style (16th Edition):

Jali, Mohd Zalisham. “A study of graphical alternatives for user authentication.” 2011. Doctoral Dissertation, University of Plymouth. Accessed October 17, 2019. http://hdl.handle.net/10026.1/881.

MLA Handbook (7th Edition):

Jali, Mohd Zalisham. “A study of graphical alternatives for user authentication.” 2011. Web. 17 Oct 2019.

Vancouver:

Jali MZ. A study of graphical alternatives for user authentication. [Internet] [Doctoral dissertation]. University of Plymouth; 2011. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10026.1/881.

Council of Science Editors:

Jali MZ. A study of graphical alternatives for user authentication. [Doctoral Dissertation]. University of Plymouth; 2011. Available from: http://hdl.handle.net/10026.1/881


Bowling Green State University

10. Komanduri, Saranga. Improving Password Usability with Visual Techniques.

Degree: MS, Computer Science, 2007, Bowling Green State University

  Current technology is more than capable of providing a secure authentication process, but users are limited in their ability to remember difficult passwords or… (more)

Subjects/Keywords: passwords; graphical authentication; picture superiority; security indicators

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Komanduri, S. (2007). Improving Password Usability with Visual Techniques. (Masters Thesis). Bowling Green State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1194297698

Chicago Manual of Style (16th Edition):

Komanduri, Saranga. “Improving Password Usability with Visual Techniques.” 2007. Masters Thesis, Bowling Green State University. Accessed October 17, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1194297698.

MLA Handbook (7th Edition):

Komanduri, Saranga. “Improving Password Usability with Visual Techniques.” 2007. Web. 17 Oct 2019.

Vancouver:

Komanduri S. Improving Password Usability with Visual Techniques. [Internet] [Masters thesis]. Bowling Green State University; 2007. [cited 2019 Oct 17]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1194297698.

Council of Science Editors:

Komanduri S. Improving Password Usability with Visual Techniques. [Masters Thesis]. Bowling Green State University; 2007. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1194297698


Carnegie Mellon University

11. Komanduri, Saranga. Modeling the Adversary to Evaluate Password Strength With Limited Samples.

Degree: 2016, Carnegie Mellon University

 In an effort to improve security by preventing users from picking weak passwords, system administrators set password-composition policies, sets of requirements that passwords must meet.… (more)

Subjects/Keywords: passwords; security; usability; policy; modeling; statistics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Komanduri, S. (2016). Modeling the Adversary to Evaluate Password Strength With Limited Samples. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Komanduri, Saranga. “Modeling the Adversary to Evaluate Password Strength With Limited Samples.” 2016. Thesis, Carnegie Mellon University. Accessed October 17, 2019. http://repository.cmu.edu/dissertations/677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Komanduri, Saranga. “Modeling the Adversary to Evaluate Password Strength With Limited Samples.” 2016. Web. 17 Oct 2019.

Vancouver:

Komanduri S. Modeling the Adversary to Evaluate Password Strength With Limited Samples. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2019 Oct 17]. Available from: http://repository.cmu.edu/dissertations/677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Komanduri S. Modeling the Adversary to Evaluate Password Strength With Limited Samples. [Thesis]. Carnegie Mellon University; 2016. Available from: http://repository.cmu.edu/dissertations/677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Ur, Blase Eric. Supporting Password-Security Decisions with Data.

Degree: 2016, Carnegie Mellon University

 Despite decades of research into developing abstract security advice and improving interfaces, users still struggle to make passwords. Users frequently create passwords that are predictable… (more)

Subjects/Keywords: Usable security; computer security; passwords; authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ur, B. E. (2016). Supporting Password-Security Decisions with Data. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/845

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ur, Blase Eric. “Supporting Password-Security Decisions with Data.” 2016. Thesis, Carnegie Mellon University. Accessed October 17, 2019. http://repository.cmu.edu/dissertations/845.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ur, Blase Eric. “Supporting Password-Security Decisions with Data.” 2016. Web. 17 Oct 2019.

Vancouver:

Ur BE. Supporting Password-Security Decisions with Data. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2019 Oct 17]. Available from: http://repository.cmu.edu/dissertations/845.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ur BE. Supporting Password-Security Decisions with Data. [Thesis]. Carnegie Mellon University; 2016. Available from: http://repository.cmu.edu/dissertations/845

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Bonneau, Joseph. Guessing human-chosen secrets .

Degree: 2012, University of Cambridge

 Authenticating humans to computers remains a notable weak point in computer security despite decades of effort. Although the security research community has explored dozens of… (more)

Subjects/Keywords: Passwords; Authentication

…Improvements to passwords 26 2.4 Password cracking 34 2.5 Evaluating guessing difficulty 36 3… …5.6 Parametric extension of our approximations 79 6 Guessing difficulty of passwords 82… …metrics 113 9.2 Estimation from a sample 115 9.3 Application to individual passwords 116… …deployed means of humancomputer authentication. Most notably, text passwords dominate… …trading in stolen passwords. Due to the widespread re-use of passwords across sites [152… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bonneau, J. (2012). Guessing human-chosen secrets . (Thesis). University of Cambridge. Retrieved from http://www.dspace.cam.ac.uk/handle/1810/243444

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets .” 2012. Thesis, University of Cambridge. Accessed October 17, 2019. http://www.dspace.cam.ac.uk/handle/1810/243444.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets .” 2012. Web. 17 Oct 2019.

Vancouver:

Bonneau J. Guessing human-chosen secrets . [Internet] [Thesis]. University of Cambridge; 2012. [cited 2019 Oct 17]. Available from: http://www.dspace.cam.ac.uk/handle/1810/243444.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bonneau J. Guessing human-chosen secrets . [Thesis]. University of Cambridge; 2012. Available from: http://www.dspace.cam.ac.uk/handle/1810/243444

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

14. Joudaki, Zeinab. Towards implicit learning of system-assigned authentication tokens.

Degree: 2018, University of Ontario Institute of Technology

 People tend to choose predictable passwords which are vulnerable to guessing attacks. To combat the security issue, system-assigned authentication keys were proposed, but coming at… (more)

Subjects/Keywords: Authentication; System-assisted passwords; Implicit learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joudaki, Z. (2018). Towards implicit learning of system-assigned authentication tokens. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Joudaki, Zeinab. “Towards implicit learning of system-assigned authentication tokens.” 2018. Thesis, University of Ontario Institute of Technology. Accessed October 17, 2019. http://hdl.handle.net/10155/983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Joudaki, Zeinab. “Towards implicit learning of system-assigned authentication tokens.” 2018. Web. 17 Oct 2019.

Vancouver:

Joudaki Z. Towards implicit learning of system-assigned authentication tokens. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10155/983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Joudaki Z. Towards implicit learning of system-assigned authentication tokens. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – Sacramento

15. Shenoy, Shweta. Empirical analysis on the usability and security of passwords.

Degree: MS, Computer Science, 2019, California State University – Sacramento

 Security and usability have been on the opposite ends of the spectrum; sometimes, to achieve one, the other must be compromised to some extent. Passwords(more)

Subjects/Keywords: Passwords; Security; Usability; Usable security; Password policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shenoy, S. (2019). Empirical analysis on the usability and security of passwords. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.3/210200

Chicago Manual of Style (16th Edition):

Shenoy, Shweta. “Empirical analysis on the usability and security of passwords.” 2019. Masters Thesis, California State University – Sacramento. Accessed October 17, 2019. http://hdl.handle.net/10211.3/210200.

MLA Handbook (7th Edition):

Shenoy, Shweta. “Empirical analysis on the usability and security of passwords.” 2019. Web. 17 Oct 2019.

Vancouver:

Shenoy S. Empirical analysis on the usability and security of passwords. [Internet] [Masters thesis]. California State University – Sacramento; 2019. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10211.3/210200.

Council of Science Editors:

Shenoy S. Empirical analysis on the usability and security of passwords. [Masters Thesis]. California State University – Sacramento; 2019. Available from: http://hdl.handle.net/10211.3/210200


Rutgers University

16. Patel, Shivani, 1994-. Graphical passwords using zooming.

Degree: MS, Graphical passwords, 2019, Rutgers University

 User authentication is a process of authenticating a person to enter the system, and with the growing need for digitizing the data, user authentication plays… (more)

Subjects/Keywords: Computer Science; Computers  – Access control  – Passwords

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patel, Shivani, 1. (2019). Graphical passwords using zooming. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/60863/

Chicago Manual of Style (16th Edition):

Patel, Shivani, 1994-. “Graphical passwords using zooming.” 2019. Masters Thesis, Rutgers University. Accessed October 17, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/60863/.

MLA Handbook (7th Edition):

Patel, Shivani, 1994-. “Graphical passwords using zooming.” 2019. Web. 17 Oct 2019.

Vancouver:

Patel, Shivani 1. Graphical passwords using zooming. [Internet] [Masters thesis]. Rutgers University; 2019. [cited 2019 Oct 17]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/60863/.

Council of Science Editors:

Patel, Shivani 1. Graphical passwords using zooming. [Masters Thesis]. Rutgers University; 2019. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/60863/

17. Norrington, Peter. Novel, robust and cost-effective authentication techniques for online services.

Degree: PhD, 2009, University of Bedfordshire

 This thesis contributes to the study of the usability and security of visuo-cognitive authentication techniques, particularly those relying on recognition of abstract images, an area… (more)

Subjects/Keywords: 621.382; authentication : visual passwords : passwords : computer security : visuo-cognitive authentication : G920 Others in Computing Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Norrington, P. (2009). Novel, robust and cost-effective authentication techniques for online services. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/134951

Chicago Manual of Style (16th Edition):

Norrington, Peter. “Novel, robust and cost-effective authentication techniques for online services.” 2009. Doctoral Dissertation, University of Bedfordshire. Accessed October 17, 2019. http://hdl.handle.net/10547/134951.

MLA Handbook (7th Edition):

Norrington, Peter. “Novel, robust and cost-effective authentication techniques for online services.” 2009. Web. 17 Oct 2019.

Vancouver:

Norrington P. Novel, robust and cost-effective authentication techniques for online services. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10547/134951.

Council of Science Editors:

Norrington P. Novel, robust and cost-effective authentication techniques for online services. [Doctoral Dissertation]. University of Bedfordshire; 2009. Available from: http://hdl.handle.net/10547/134951


Macquarie University

18. Asghar, Hassan Jameel. Design and analysis of human identification protocols.

Degree: PhD, 2012, Macquarie University

Bibliography: p. 149-154.

1. Introduction  – 2. Preliminaries and related work  – 3. Security analysis of PAS (Predicate-based Authentication Service)  – 4. Security analysis of… (more)

Subjects/Keywords: Computers  – Access control  – Passwords; Computer security; computer security; information security; passwords; human identification protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Asghar, H. J. (2012). Design and analysis of human identification protocols. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/214483

Chicago Manual of Style (16th Edition):

Asghar, Hassan Jameel. “Design and analysis of human identification protocols.” 2012. Doctoral Dissertation, Macquarie University. Accessed October 17, 2019. http://hdl.handle.net/1959.14/214483.

MLA Handbook (7th Edition):

Asghar, Hassan Jameel. “Design and analysis of human identification protocols.” 2012. Web. 17 Oct 2019.

Vancouver:

Asghar HJ. Design and analysis of human identification protocols. [Internet] [Doctoral dissertation]. Macquarie University; 2012. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/1959.14/214483.

Council of Science Editors:

Asghar HJ. Design and analysis of human identification protocols. [Doctoral Dissertation]. Macquarie University; 2012. Available from: http://hdl.handle.net/1959.14/214483


University of Plymouth

19. Alsaiari, Hussain. Graphical one-time password authentication.

Degree: PhD, 2016, University of Plymouth

 Complying with a security policy often requires users to create long and complex passwords to protect their accounts. However, remembering such passwords appears difficult for… (more)

Subjects/Keywords: 005.8; authentication; graphical passwords; one-time password; usable security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alsaiari, H. (2016). Graphical one-time password authentication. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/8145

Chicago Manual of Style (16th Edition):

Alsaiari, Hussain. “Graphical one-time password authentication.” 2016. Doctoral Dissertation, University of Plymouth. Accessed October 17, 2019. http://hdl.handle.net/10026.1/8145.

MLA Handbook (7th Edition):

Alsaiari, Hussain. “Graphical one-time password authentication.” 2016. Web. 17 Oct 2019.

Vancouver:

Alsaiari H. Graphical one-time password authentication. [Internet] [Doctoral dissertation]. University of Plymouth; 2016. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10026.1/8145.

Council of Science Editors:

Alsaiari H. Graphical one-time password authentication. [Doctoral Dissertation]. University of Plymouth; 2016. Available from: http://hdl.handle.net/10026.1/8145


Linnaeus University

20. Svensson, Rickard. Cued Click-Point Memorability.

Degree: Computer Science, 2015, Linnaeus University

  The Safety of passwords has been in question for over 40 years, long before the Internet. While improvements have been made to ensure security… (more)

Subjects/Keywords: User Authentication; Graphical Passwords; Cued Click-Points; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Svensson, R. (2015). Cued Click-Point Memorability. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-47604

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Svensson, Rickard. “Cued Click-Point Memorability.” 2015. Thesis, Linnaeus University. Accessed October 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-47604.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Svensson, Rickard. “Cued Click-Point Memorability.” 2015. Web. 17 Oct 2019.

Vancouver:

Svensson R. Cued Click-Point Memorability. [Internet] [Thesis]. Linnaeus University; 2015. [cited 2019 Oct 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-47604.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Svensson R. Cued Click-Point Memorability. [Thesis]. Linnaeus University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-47604

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

21. Jmaiel Ep Louati, Abir. Password-authenticated key exchange based on RSA.

Degree: 2016, Hong Kong University of Science and Technology

 Key agreement protocol is an information security technique that allows two or more entities to agree upon a secret key and use it over a… (more)

Subjects/Keywords: Cryptography; Computer networks; Security measures; Computers; Access control; Passwords

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jmaiel Ep Louati, A. (2016). Password-authenticated key exchange based on RSA. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b1590235 ; http://repository.ust.hk/ir/bitstream/1783.1-82382/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jmaiel Ep Louati, Abir. “Password-authenticated key exchange based on RSA.” 2016. Thesis, Hong Kong University of Science and Technology. Accessed October 17, 2019. https://doi.org/10.14711/thesis-b1590235 ; http://repository.ust.hk/ir/bitstream/1783.1-82382/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jmaiel Ep Louati, Abir. “Password-authenticated key exchange based on RSA.” 2016. Web. 17 Oct 2019.

Vancouver:

Jmaiel Ep Louati A. Password-authenticated key exchange based on RSA. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2016. [cited 2019 Oct 17]. Available from: https://doi.org/10.14711/thesis-b1590235 ; http://repository.ust.hk/ir/bitstream/1783.1-82382/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jmaiel Ep Louati A. Password-authenticated key exchange based on RSA. [Thesis]. Hong Kong University of Science and Technology; 2016. Available from: https://doi.org/10.14711/thesis-b1590235 ; http://repository.ust.hk/ir/bitstream/1783.1-82382/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Clemson University

22. Ranganayakulu, Sanjaykumar. A SYSTEM-GENERATED PASSWORD AND MNEMONIC APPROACH TO OPTIMIZE THE SECURITY AND USABILITY OF TEXT-BASED PASSWORDS.

Degree: MS, Industrial Engineering, 2012, Clemson University

 In this study a novel password generation policy called the system-generated password and mnemonic was designed and implemented. The intent of this policy was to… (more)

Subjects/Keywords: Human-Computer Interaction; Human-Factors; Passwords; Security; Usability; Industrial Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ranganayakulu, S. (2012). A SYSTEM-GENERATED PASSWORD AND MNEMONIC APPROACH TO OPTIMIZE THE SECURITY AND USABILITY OF TEXT-BASED PASSWORDS. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/1329

Chicago Manual of Style (16th Edition):

Ranganayakulu, Sanjaykumar. “A SYSTEM-GENERATED PASSWORD AND MNEMONIC APPROACH TO OPTIMIZE THE SECURITY AND USABILITY OF TEXT-BASED PASSWORDS.” 2012. Masters Thesis, Clemson University. Accessed October 17, 2019. https://tigerprints.clemson.edu/all_theses/1329.

MLA Handbook (7th Edition):

Ranganayakulu, Sanjaykumar. “A SYSTEM-GENERATED PASSWORD AND MNEMONIC APPROACH TO OPTIMIZE THE SECURITY AND USABILITY OF TEXT-BASED PASSWORDS.” 2012. Web. 17 Oct 2019.

Vancouver:

Ranganayakulu S. A SYSTEM-GENERATED PASSWORD AND MNEMONIC APPROACH TO OPTIMIZE THE SECURITY AND USABILITY OF TEXT-BASED PASSWORDS. [Internet] [Masters thesis]. Clemson University; 2012. [cited 2019 Oct 17]. Available from: https://tigerprints.clemson.edu/all_theses/1329.

Council of Science Editors:

Ranganayakulu S. A SYSTEM-GENERATED PASSWORD AND MNEMONIC APPROACH TO OPTIMIZE THE SECURITY AND USABILITY OF TEXT-BASED PASSWORDS. [Masters Thesis]. Clemson University; 2012. Available from: https://tigerprints.clemson.edu/all_theses/1329


University of South Carolina

23. Tian, Jing. Authenticating Users with 3D Passwords Captured by Motion Sensors.

Degree: PhD, Computer Science and Engineering, 2018, University of South Carolina

  Authentication plays a key role in securing various resources including corporate facilities or electronic assets. As the most used authentication scheme, knowledgebased authentication is… (more)

Subjects/Keywords: Computer Engineering; Computer Sciences; Engineering; Authenticating Users; 3D Passwords; Motion Sensors

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tian, J. (2018). Authenticating Users with 3D Passwords Captured by Motion Sensors. (Doctoral Dissertation). University of South Carolina. Retrieved from https://scholarcommons.sc.edu/etd/4593

Chicago Manual of Style (16th Edition):

Tian, Jing. “Authenticating Users with 3D Passwords Captured by Motion Sensors.” 2018. Doctoral Dissertation, University of South Carolina. Accessed October 17, 2019. https://scholarcommons.sc.edu/etd/4593.

MLA Handbook (7th Edition):

Tian, Jing. “Authenticating Users with 3D Passwords Captured by Motion Sensors.” 2018. Web. 17 Oct 2019.

Vancouver:

Tian J. Authenticating Users with 3D Passwords Captured by Motion Sensors. [Internet] [Doctoral dissertation]. University of South Carolina; 2018. [cited 2019 Oct 17]. Available from: https://scholarcommons.sc.edu/etd/4593.

Council of Science Editors:

Tian J. Authenticating Users with 3D Passwords Captured by Motion Sensors. [Doctoral Dissertation]. University of South Carolina; 2018. Available from: https://scholarcommons.sc.edu/etd/4593


Rochester Institute of Technology

24. Waters, Samuel. Web-­based single sign-on: an examination of security and usability.

Degree: 2012, Rochester Institute of Technology

 Among system administrators, users are generally considered the weakest link in the security chain. One of the biggest concerns is how users create and remember… (more)

Subjects/Keywords: Identity federation; Passwords; Security; Single sign on; Usability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Waters, S. (2012). Web-­based single sign-on: an examination of security and usability. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/4931

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Waters, Samuel. “Web-­based single sign-on: an examination of security and usability.” 2012. Thesis, Rochester Institute of Technology. Accessed October 17, 2019. https://scholarworks.rit.edu/theses/4931.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Waters, Samuel. “Web-­based single sign-on: an examination of security and usability.” 2012. Web. 17 Oct 2019.

Vancouver:

Waters S. Web-­based single sign-on: an examination of security and usability. [Internet] [Thesis]. Rochester Institute of Technology; 2012. [cited 2019 Oct 17]. Available from: https://scholarworks.rit.edu/theses/4931.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Waters S. Web-­based single sign-on: an examination of security and usability. [Thesis]. Rochester Institute of Technology; 2012. Available from: https://scholarworks.rit.edu/theses/4931

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

25. Louwrens, Cecil Petrus. Single sign-on in heterogeneous computer environments.

Degree: 2012, University of Johannesburg

M.Sc.

The aim of this dissertation (referred to as thesis in the rest of the document) is to investigate the concept of Single Sign-on (SSO)… (more)

Subjects/Keywords: Computers - Access control.; Computers - Access control - Passwords.; Single sign-on.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Louwrens, C. P. (2012). Single sign-on in heterogeneous computer environments. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Thesis, University of Johannesburg. Accessed October 17, 2019. http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Louwrens, Cecil Petrus. “Single sign-on in heterogeneous computer environments.” 2012. Web. 17 Oct 2019.

Vancouver:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10210/7051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Louwrens CP. Single sign-on in heterogeneous computer environments. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

26. Ndaba, Sipho Lawrence. Authentication techniques for secure Internet commerce.

Degree: 2012, University of Johannesburg

M.Sc.(Computer Science)

The aim of this dissertation (referred to as thesis in the rest of the document) is to present authentication techniques that can be… (more)

Subjects/Keywords: Electronic commerce  – Security measures; Internet  – Security measures; Computers  – Access control  – Passwords

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ndaba, S. L. (2012). Authentication techniques for secure Internet commerce. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6552

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ndaba, Sipho Lawrence. “Authentication techniques for secure Internet commerce.” 2012. Thesis, University of Johannesburg. Accessed October 17, 2019. http://hdl.handle.net/10210/6552.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ndaba, Sipho Lawrence. “Authentication techniques for secure Internet commerce.” 2012. Web. 17 Oct 2019.

Vancouver:

Ndaba SL. Authentication techniques for secure Internet commerce. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10210/6552.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ndaba SL. Authentication techniques for secure Internet commerce. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6552

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Crepulja, Darko. Primerjava zapomnljivosti med grafičnimi in tekstovnimi gesli.

Degree: 2018, Univerza v Mariboru

Vnašanje gesel je opravilo, s katerim se v sodobnem času srečujemo vsak dan. Vedno večkrat se zgodi, da zaradi števila računov in gesel, ki so… (more)

Subjects/Keywords: besedilna gesla; grafična gesla; zapomnljivost; shema grafičnih gesel; geslo; text-based passwords; graphical passwords; memorability; graphical password scheme; password; info:eu-repo/classification/udc/004.056.523(043.2)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Crepulja, D. (2018). Primerjava zapomnljivosti med grafičnimi in tekstovnimi gesli. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=72101 ; https://dk.um.si/Dokument.php?id=129154&dn= ; https://plus.si.cobiss.net/opac7/bib/21884182?lang=sl

Chicago Manual of Style (16th Edition):

Crepulja, Darko. “Primerjava zapomnljivosti med grafičnimi in tekstovnimi gesli.” 2018. Masters Thesis, Univerza v Mariboru. Accessed October 17, 2019. https://dk.um.si/IzpisGradiva.php?id=72101 ; https://dk.um.si/Dokument.php?id=129154&dn= ; https://plus.si.cobiss.net/opac7/bib/21884182?lang=sl.

MLA Handbook (7th Edition):

Crepulja, Darko. “Primerjava zapomnljivosti med grafičnimi in tekstovnimi gesli.” 2018. Web. 17 Oct 2019.

Vancouver:

Crepulja D. Primerjava zapomnljivosti med grafičnimi in tekstovnimi gesli. [Internet] [Masters thesis]. Univerza v Mariboru; 2018. [cited 2019 Oct 17]. Available from: https://dk.um.si/IzpisGradiva.php?id=72101 ; https://dk.um.si/Dokument.php?id=129154&dn= ; https://plus.si.cobiss.net/opac7/bib/21884182?lang=sl.

Council of Science Editors:

Crepulja D. Primerjava zapomnljivosti med grafičnimi in tekstovnimi gesli. [Masters Thesis]. Univerza v Mariboru; 2018. Available from: https://dk.um.si/IzpisGradiva.php?id=72101 ; https://dk.um.si/Dokument.php?id=129154&dn= ; https://plus.si.cobiss.net/opac7/bib/21884182?lang=sl

28. Mott, Martez Edward. Leveraging Motor Learning for a Tangible Password System.

Degree: MS, Computer Science, 2012, Bowling Green State University

  Tangible user interfaces (TUIs) may allow users to have more direct interaction with systems when compared to traditional graphical user interfaces (GUIs). However, the… (more)

Subjects/Keywords: Computer Science; HCI; Tangible; Passwords

…10 2.1.1. Graphical Based Passwords… …11 2.1.2. Audio-Based Passwords… …12 2.1.3. Icon-Based Passwords… …13 2.2.2. Gesture Based Passwords… …41 6.5 User Created Passwords… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mott, M. E. (2012). Leveraging Motor Learning for a Tangible Password System. (Masters Thesis). Bowling Green State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1332124765

Chicago Manual of Style (16th Edition):

Mott, Martez Edward. “Leveraging Motor Learning for a Tangible Password System.” 2012. Masters Thesis, Bowling Green State University. Accessed October 17, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1332124765.

MLA Handbook (7th Edition):

Mott, Martez Edward. “Leveraging Motor Learning for a Tangible Password System.” 2012. Web. 17 Oct 2019.

Vancouver:

Mott ME. Leveraging Motor Learning for a Tangible Password System. [Internet] [Masters thesis]. Bowling Green State University; 2012. [cited 2019 Oct 17]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1332124765.

Council of Science Editors:

Mott ME. Leveraging Motor Learning for a Tangible Password System. [Masters Thesis]. Bowling Green State University; 2012. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1332124765


University of Washington

29. Khan, Faisal Irfan Yar. Effects of Peer Feedback on Password Strength.

Degree: 2017, University of Washington

 This thesis is a study on the effects of peer-feedback on a user’s password strength. Passwords are a common sight in everyday use of an… (more)

Subjects/Keywords: cybersecurity; passwords; peerfeedback; psychology; security; sociology; Computer science; Computing and software systems.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khan, F. I. Y. (2017). Effects of Peer Feedback on Password Strength. (Thesis). University of Washington. Retrieved from http://hdl.handle.net/1773/40013

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khan, Faisal Irfan Yar. “Effects of Peer Feedback on Password Strength.” 2017. Thesis, University of Washington. Accessed October 17, 2019. http://hdl.handle.net/1773/40013.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khan, Faisal Irfan Yar. “Effects of Peer Feedback on Password Strength.” 2017. Web. 17 Oct 2019.

Vancouver:

Khan FIY. Effects of Peer Feedback on Password Strength. [Internet] [Thesis]. University of Washington; 2017. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/1773/40013.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khan FIY. Effects of Peer Feedback on Password Strength. [Thesis]. University of Washington; 2017. Available from: http://hdl.handle.net/1773/40013

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Florida Atlantic University

30. Gao, WeiZheng. Password-authenticated two-party key exchange with long-term security.

Degree: PhD, 2012, Florida Atlantic University

Summary: In the design of two-party key exchange it is common to rely on a Die-Hellman type hardness assumption in connection with elliptic curves. Unlike… (more)

Subjects/Keywords: Data encryption (Computer science); Computer networks (Security measures); Software protection; Computers – Access control – Passwords

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gao, W. (2012). Password-authenticated two-party key exchange with long-term security. (Doctoral Dissertation). Florida Atlantic University. Retrieved from http://purl.flvc.org/FAU/3342105

Chicago Manual of Style (16th Edition):

Gao, WeiZheng. “Password-authenticated two-party key exchange with long-term security.” 2012. Doctoral Dissertation, Florida Atlantic University. Accessed October 17, 2019. http://purl.flvc.org/FAU/3342105.

MLA Handbook (7th Edition):

Gao, WeiZheng. “Password-authenticated two-party key exchange with long-term security.” 2012. Web. 17 Oct 2019.

Vancouver:

Gao W. Password-authenticated two-party key exchange with long-term security. [Internet] [Doctoral dissertation]. Florida Atlantic University; 2012. [cited 2019 Oct 17]. Available from: http://purl.flvc.org/FAU/3342105.

Council of Science Editors:

Gao W. Password-authenticated two-party key exchange with long-term security. [Doctoral Dissertation]. Florida Atlantic University; 2012. Available from: http://purl.flvc.org/FAU/3342105

[1] [2]

.