The generation of random permutations on the fly, Inf. Process. Lett, vol.28, issue.4, pp.207-212, 1988. ,
The science of guessing : Analyzing an anonymized corpus of 70 million passwords, 2012 IEEE Symposium on Security and Privacy, vol.5, p.2012 ,
password typos and how to correct them securely, Security and Privacy (SP), 2016 IEEE Symposium on, pp.799-818, 2016. ,
The typtop system : Personalized typo-tolerant password checking, Proceedings of the 2017 ,
, ACM SIGSAC Conference on Computer and Communications Security, CCS '17, pp.329-346, 2017.
Guess again (and again and again) : Measuring password strength by simulating password-cracking algorithms, Security and Privacy (SP), 2012 IEEE Symposium on, pp.523-537, 2012. ,
The security risks of using "forgot my password" to manage passwords, pp.2017-2029, 2016. ,
Password entropy and password quality, 2010 Fourth International Conference on Network and System Security, pp.583-587, 2010. ,
How biometric authentication poses new challenges to our security and privacy, IEEE Signal Processing Magazine, vol.34, issue.4, pp.196-194, 2017. ,
Nicolas Christin, and Lorrie F. Cranor. I added ' !'at the end to make it secure" : Observing password creation in the lab, Proc. SOUPS, 2015. ,