References
- Bruce Schneier, "Applied Cryptography," John Wiley & Sons, 1996.
- Perlman, Radia, and Charlie Kaufman, "User-centric PKI," Proceedings of the 7th Symposium on Identity and Trust on the Internet. ACM, 2008.
- Just, Mike, and David Aspinall, "Personal Choice and Challenge Questions: A Security and Usability Assessment," Poceedings of the 5th Symposium on Usable Privacy and Security. ACM, 2009.
- Jin, Lei, Hassan Takabi, and James BD Joshi, "Analysing security and privacy issues of using e-mail address as identity," International Journal of Information Privacy, Security and Integrity, 1.1. pp.34-58, 2011. https://doi.org/10.1504/IJIPSI.2011.043730
- C.E. Shannon, "A mathematical theory of communication," Bell System Technical Journal, Vol.27, pp.379-423, 1948. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
- Komanduri, Saranga, et al., "Of passwords and people: measuring the effect of password-composition policies," Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2011.
- Ma, Wanli, et al., "Password entropy and password quality," Network and System Security (NSS), 2010 4th International Conference on. IEEE, 2010.
- Yan, Jianxin Jeff, "A note on proactive password checking," Proceedings of the 2001 workshop on New security paradigms. ACM, 2001.
- Bishop, Matt, "Proactive password checking," 4th Workshop on Computer Security Incident Handling, 1992.
- "Common Methodology for Information Technology Security Evaluation," Common Criteria, Version 3.1. Jul., 2009.
- Cazier, Joseph A., and B. Dawn Medlin, "Password security: An empirical investigation into e-commerce passwords and their crack times," Information Systems Security 15.6. pp.45-55, 2006. https://doi.org/10.1080/10658980601051318
- Ji Sun Shin, "Study on Anti-Phishing Solutions, Related Researches and Future Directions," Journal of The Korea Institute of Information Security & Cryptology, Vol.23, No.6, Dec., 2013.
- Leijten, Marielle, and Luuk Van Waes, "Keystroke Logging in Writing Research Using Inputlog to Analyze and Visualize Writing Processes," Written Communication 30.3, pp.358-392, 2013. https://doi.org/10.1177/0741088313491692
- "2014 Trustwave Global Security Report," Trustwave, 2014.
- Dell'Amico, Matteo, Pietro Michiardi, and Yves Roudier, "Password strength: An empirical analysis," INFOCOM, 2010 Proceedings IEEE. IEEE, 2010.
- Irani, Danesh, et al., "Modeling unintended personalinformation leakage from multiple online social networks," Internet Computing, IEEE 15.3, pp.13-19, 2011.
- HyeongKyu Lee, "The Problems and Reformation of the Personal Identification by the Resident Registration Number on the Internet," Hanyang Law Review, Vol.23-1, pp.341-371, Feb., 2012.
- Von Ahn, Luis, et al., "CAPTCHA: Using hard AI problems for security," Advances in Cryptology-EUROCRYPT 2003. Springer Berlin Heidelberg, pp.294-311, 2003.
- Lei Jin, Hassan Takabi, James B.D. Joshi, "Analysing security and privacy issues of using e-mail address as identity," International Journal of Information Privacy, Security and Integrity, Vol.1, No.1, pp.34-58, 2011. https://doi.org/10.1504/IJIPSI.2011.043730
- Goring, Stuart P., Joseph R. Rabaiotti, and Antonia J. Jones, "Anti-keylogging measures for secure Internet login: an example of the law of unintended consequences," Computers & Security 26.6, pp.421-426, 2007. https://doi.org/10.1016/j.cose.2007.05.003
- "Kaspersky Releases Q1 Spam Report," Kaspersky, 2014.
- Lei Jin, Hassan Takabi, James B.D. Joshi, "Analysing security and privacy issues of using e-mail address as identity," International Journal of Information Privacy, Security and Integrity, Vol.1, No.1, pp.34-58, 2011. https://doi.org/10.1504/IJIPSI.2011.043730
Cited by
- A Study on the Operation and Personal Information Management of Public and Private Kindergarten Homepages vol.37, pp.6, 2016, https://doi.org/10.5723/kjcs.2016.37.6.119