ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
29
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,186
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates
Author(s):
Rachael Pond
,
John Podd
,
Julie Bunnell
,
Ron Henderson
Publication date
Created:
November 2000
Publication date
(Print):
November 2000
Journal:
Computers & Security
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Journal for the History of Environment and Society
Author and article information
Journal
Title:
Computers & Security
Abbreviated Title:
Computers & Security
Publisher:
Elsevier BV
ISSN (Print):
01674048
Publication date Created:
November 2000
Publication date (Print):
November 2000
Volume
: 19
Issue
: 7
Pages
: 645-656
Article
DOI:
10.1016/S0167-4048(00)07023-1
SO-VID:
c256151a-5718-48c1-880d-fe186dd69f5d
Copyright ©
© 2000
License:
https://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
5,186
Guessing versus Choosing an Upcoming Task
Authors:
Thomas Kleinsorge
,
Juliane Scheil
Coronavirus creates a flu season guessing game
Authors:
Kelly Servick
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
Authors:
Duncan Hodges
See all similar
Cited by
3
Comparing passwords, tokens, and biometrics for user authentication
Authors:
L. O'Gorman
Designing and evaluating challenge-question systems
Authors:
M Just
It’s a Pleasure to Meet You
Authors:
Sandra Wilson
,
Lilia Gomez Flores
,
Douglas Kinnear
See all cited by