ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
28
views
0
references
Top references
cited by
19
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,754
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
The true cost of unusable password policies : password use in the wild
proceedings-article
Author(s):
Philip G. Inglesant
,
M. Angela Sasse
Publication date
(Print):
2010
Conference name:
the 28th international conference (CHI '10)
Conference date:
May 10, 2010 - May 15, 2010
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Digitizing Fabrication
Author and article information
Conference
Publication date (Print):
2010
Page
: 383
Article
DOI:
10.1145/1753326.1753384
SO-VID:
5473e11e-a955-4582-93e8-ff0640f86e84
Copyright ©
© 2010
Conference name:
the 28th international conference
Conference acronym:
CHI '10
Conference number:
28
Conference location:
Atlanta, Georgia, USA
Conference date:
May 10, 2010 - May 15, 2010
Conference sponsor:
SIGCHI, ACM Special Interest Group on Computer-Human Interaction
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,754
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
Authors:
Duncan Hodges
One-time-password-authenticated key exchange
Authors:
KG Paterson
,
D. Stebila
,
Kenneth G. Paterson
…
Improvement of efficient and secure smart card based password authentication scheme
Authors:
See all similar
Cited by
19
Using and managing multiple passwords: A week to a view
Authors:
Beate Grawemeyer
,
Hilary Johnson
Circumvention of Security: Good Users Do Bad Things
Authors:
Sean W Smith
,
Ross Koppel
,
Jim Blythe
Designing Password Policies for Strength and Usability
Authors:
Richard Shay
,
Lorrie Cranor
,
Saranga Komanduri
…
See all cited by