Working memory, pp.47-90, 1974. ,
Anupam Datta, and Santosh Vempala. 2014. Towards Human Computable Passwords. arXiv preprint, 2014. ,
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, 2012 IEEE Symposium on Security and Privacy, pp.538-552, 2012. ,
DOI : 10.1109/SP.2012.49
,
Linguistic Properties of Multi-word Passphrases, International Conference on Financial Cryptography and Data Security, pp.1-12, 2012. ,
DOI : 10.1007/978-3-642-34638-5_1
Are Passfaces More Usable Than Passwords? A Field Trial Investigation, pp.405-424978, 2000. ,
DOI : 10.1007/978-1-4471-0515-2_27
How Many Words Do We Know? Practical Estimates of Vocabulary Size Dependent on Word Definition, the Degree of Language Input and the Participant???s Age, Frontiers in Psychology, vol.27, issue.943, 2016. ,
DOI : 10.1080/10862969509547878
Hacking Mobile Phones Using 2D Printed Fingerprints, 2016. ,
What's wrong with your pa$$word, 2014. ,
Time to rethink mandatory password changes, 2016. ,
The positive effect of assortment size on purchase likelihood: The moderating influence of decision order, Journal of Consumer Psychology, vol.34, issue.2, pp.542-549, 2016. ,
DOI : 10.1086/519293
Usable Security: History, Themes, and Challenges, Synthesis Lectures on Information Security, Privacy, and Trust, vol.4, issue.2, 2014. ,
DOI : 10.1145/304851.304859
Extension of Zipf's Law to Words and Phrases, Proceedings of the 19th International Conference on Computational Linguistics, 2002. ,
Further evidence on the unexpected large size of recognition vocabularies among college students, Journal of educational psychology, vol.37, issue.7, p.436, 1946. ,
An Assessment Framework for Usable-Security Based on Decision Science, pp.33-44978, 2014. ,
The domino effect of password reuse, Communications of the ACM, vol.47, issue.4, pp.75-78, 2004. ,
DOI : 10.1145/975817.975820
Of passwords and people, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2595-2604, 2011. ,
DOI : 10.1145/1978942.1979321
, , 1998.
Human selection of mnemonic phrase-based passwords, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.67-78, 2006. ,
DOI : 10.1145/1143120.1143129
Passphrases that you can memorize ? but that even the NSA can't guess. https://theintercept.com/2015/03/26/passphrases-can- memorize-attackers-cant-guess, 2015. ,
The Security Risks of UsingForgot My Password" to Manage Passwords. https://www.stickypassword.com/blog/the-security-risks- of-using-forgot-my-password-to-manage-passwords, 2016. ,
, Accessed, pp.2017-2029, 2016.
The magical number seven, plus or minus two: some limits on our capacity for processing information, Psychological review, vol.63, issue.2, p.81, 1956. ,
Natural language corpus data, Beautiful Data, pp.219-242, 2009. ,
Language: selected readings, 1968. ,
Passwords Usage and Human Memory Limitations: A Survey across Age and Educational Background, e51067. DOI, 2012. ,
DOI : 10.1371/journal.pone.0051067.t006
URL : https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0051067&type=printable
A password extension for improved human factors, Computers & Security, vol.1, issue.1, pp.54-56, 1982. ,
A New Antispoofing Approach for Biometric Devices, pp.4-328, 2008. ,
Direct Attacks Using Fake Images in Iris Verification, pp.181-190978, 2008. ,
DOI : 10.1109/CCST.2006.313440
Diversify to Survive: Making Passwords Stronger with Adaptive Policies, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, pp.1-12, 2017. ,
Can long passwords be secure and usable?, Proceedings of the 32nd annual ACM conference on Human factors in computing systems, CHI '14, pp.2927-2936, 2014. ,
DOI : 10.1145/2556288.2557377
Privacy Weaknesses in Biometric Sketches, 2009 30th IEEE Symposium on Security and Privacy, pp.188-203, 2009. ,
DOI : 10.1109/SP.2009.24
Face Recognition on Consumer Devices: Reflections on Replay Attacks, IEEE Transactions on Information Forensics and Security, vol.10, pp.736-745, 2015. ,
Passwords decay, words endure, Proceedings of the 2007 ACM symposium on Applied computing , SAC '07, pp.292-299, 2007. ,
DOI : 10.1145/1244002.1244072
Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites, Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, pp.175-188, 2016. ,
Password memorability and security: empirical results, IEEE Security & Privacy Magazine, vol.2, issue.5, pp.25-3181, 2004. ,
DOI : 10.1109/MSP.2004.81
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1216-1229, 2016. ,
DOI : 10.1016/j.cose.2014.07.003