Linguistic Properties of Multi-word Passphrases (English)
- New search for: Bonneau, Joseph
- New search for: Shutova, Ekaterina
- New search for: Bonneau, Joseph
- New search for: Shutova, Ekaterina
In:
Financial Cryptography and Data Security
1
;
1-12
;
2012
- Article/Chapter (Book) / Electronic Resource
-
Title:Linguistic Properties of Multi-word Passphrases
-
Contributors:Bonneau, Joseph ( author ) / Shutova, Ekaterina ( author )
-
Published in:Financial Cryptography and Data Security , 1 ; 1-12Lecture Notes in Computer Science ; 7398, 1 ; 1-12
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2012-01-01
-
Size:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Linguistic Properties of Multi-word PassphrasesBonneau, Joseph / Shutova, Ekaterina et al. | 2012
- 13
-
Understanding the Weaknesses of Human-Protocol InteractionCarlos, Marcelo / Price, Geraint et al. | 2012
- 27
-
High Stakes: Designing a Privacy Preserving RegistryCzeskis, Alexei / Appelbaum, Jacob et al. | 2012
- 44
-
Protected LoginCzeskis, Alexei / Balfanz, Dirk et al. | 2012
- 53
-
Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area NetworksDong, Zheng et al. | 2012
- 68
-
A Conundrum of Permissions: Installing Applications on an Android SmartphoneKelley, Patrick Gage / Consolvo, Sunny / Cranor, Lorrie Faith / Jung, Jaeyeon / Sadeh, Norman / Wetherall, David et al. | 2012
- 80
-
Methodology for a Field Study of Anti-malware SoftwareLalonde Lévesque, Fanny / Davis, Carlton R. / Fernandez, José M. / Chiasson, Sonia / Somayaji, Anil et al. | 2012
- 8
-
My Privacy Policy: Exploring End-user Specification of Free-form Location Access RulesPatil, Sameer / Le Gall, Yann / Lee, Adam J. / Kapadia, Apu et al. | 2012
- 9
-
Spamming for Science: Active Measurement in Web 2.0 Abuse ResearchWest, Andrew G. / Hayati, Pedram / Potdar, Vidyasagar / Lee, Insup et al. | 2012
- 112
-
A Refined Ethical Impact Assessment Tool and a Case Study of Its ApplicationBailey, Michael / Kenneally, Erin / Dittrich, David et al. | 2012
- 124
-
It’s Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit OriginEgelman, Serge / Bonneau, Joseph / Chiasson, Sonia / Dittrich, David / Schechter, Stuart et al. | 2012
- 133
-
Ethics Committees and IRBs: Boon, or Bane, or More Research Needed?Anderson, Ross et al. | 2012
- 136
-
Ethical and Secure Data Sharing across BordersFernandez, José M. / Patrick, Andrew S. / Zuck, Lenore D. et al. | 2012