Cited By
View all- Paudel RAl-Ameen M(2024)Priming through Persuasion: Towards Secure Password BehaviorProceedings of the ACM on Human-Computer Interaction10.1145/36373878:CSCW1(1-27)Online publication date: 26-Apr-2024
- Arunakumari BShreyas RVora SShreyas RVenkatesh S(2024)Unbreakable Passwords: Fortifying Cryptographic Security with Derangement KeysData Management, Analytics and Innovation10.1007/978-981-97-3242-5_32(475-485)Online publication date: 23-Jul-2024
- Nisenoff AGolla MWei MHainline JSzymanek HBraun AHildebrandt AChristensen BLangenberg DUr BCalandrino JTroncoso C(2023)A two-decade retrospective analysis of a university's vulnerability to attacks exploiting reused passwordsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620524(5127-5144)Online publication date: 9-Aug-2023
- Show More Cited By