Internal Medicine - Education Office

Filter
Conference contribution

Search results

  • 2015

    Leveraging real-life facts to make random passwords more memorable

    Al-Ameen, M. N., Fatema, K., Wright, M. & Scielzo, S., 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer Verlag, p. 438-455 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Towards making random passwords memorable: Leveraging users' cognitive ability through multiple cues

    Al-Ameen, M. N., Wright, M. & Scielzo, S., Apr 18 2015, CHI 2015 - Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems: Crossings. Association for Computing Machinery, p. 2315-2324 10 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2015-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Scopus citations
  • 2013

    A study of user password strategy for multiple accounts

    Taiabul Haque, S. M., Wright, M. & Scielzo, S., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 173-175 3 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Passwords and interfaces: Towards creating stronger passwords by using mobile phone handsets

    Haque, S. M. T., Wright, M. & Scielzo, S., 2013, SPSM 2013 - Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013. p. 105-110 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations