3
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Human Aspects of Information Security, Privacy, and Trust 

      The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords

      other
      ,
      Springer International Publishing

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references21

          • Record: found
          • Abstract: not found
          • Article: not found

          A mathematical theory of communication

          C. Shannon (2001)
            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            D³: Data-Driven Documents.

            Data-Driven Documents (D3) is a novel representation-transparent approach to visualization for the web. Rather than hide the underlying scenegraph within a toolkit-specific abstraction, D3 enables direct inspection and manipulation of a native representation: the standard document object model (DOM). With D3, designers selectively bind input data to arbitrary document elements, applying dynamic transforms to both generate and modify content. We show how representational transparency improves expressiveness and better integrates with developer tools than prior approaches, while offering comparable notational efficiency and retaining powerful declarative components. Immediate evaluation of operators further simplifies debugging and allows iterative development. Additionally, we demonstrate how D3 transforms naturally enable animation and interaction with dramatic performance improvements over intermediate representations. © 2010 IEEE
              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Testing metrics for password creation policies by attacking large sets of revealed passwords

                Bookmark

                Author and book information

                Book Chapter
                2015
                July 21 2015
                : 95-106
                10.1007/978-3-319-20376-8_9
                e46806e7-3bce-48a9-b7ed-cc607d8b8988
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,993

                Cited by1