Login / Signup

Passwords decay, words endure: secure and re-usable multiple password mnemonics.

Umut TopkaraMikhail J. AtallahMercan Topkara
Published in: SAC (2007)
Keyphrases
  • user authentication
  • keywords
  • information security
  • n gram
  • security analysis
  • graphical password
  • authentication systems
  • authentication mechanism
  • information retrieval
  • sensitive data
  • password authentication