ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
4
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,554
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Usability, security and trust in password managers: A quest for user-centric properties and features
Author(s):
Sunil Chaudhary
,
Tiina Schafeitel-Tähtinen
,
Marko Helenius
,
Eleni Berki
Publication date
Created:
August 2019
Publication date
(Print):
August 2019
Journal:
Computer Science Review
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Criminology, Victimology and Security Journal
Author and article information
Journal
Title:
Computer Science Review
Abbreviated Title:
Computer Science Review
Publisher:
Elsevier BV
ISSN (Print):
15740137
Publication date Created:
August 2019
Publication date (Print):
August 2019
Volume
: 33
Pages
: 69-90
Article
DOI:
10.1016/j.cosrev.2019.03.002
SO-VID:
bcbcb71c-4c4c-42ae-a088-2dc9654d302a
Copyright ©
© 2019
License:
https://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,554
A Research Agenda Acknowledging the Persistence of Passwords
Authors:
P. Van Oorschot
,
C. Herley
Encountering stronger password requirements: User attitudes and behaviors
Authors:
Shay
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
Authors:
,
,
See all similar
Cited by
3
MIGRANT: Modeling Smartphone Password Manager Adoption using Migration Theory
Authors:
Nora Alkaldi
,
Karen Renaud
Measuring User-Perceived Characteristics for Banking Services: Proposing a Methodology
Authors:
Olga Vl. Bitkina
,
Jaehyun Park
,
Hyun K. Kim
A systematic literature review of cybersecurity scales assessing information security awareness
Authors:
Rohani Rohan
,
Debajyoti Pal
,
Jari Hautamäki
…
See all cited by