Login / Signup
Can long passwords be secure and usable?
Richard Shay
Saranga Komanduri
Adam L. Durity
Phillip (Seyoung) Huh
Michelle L. Mazurek
Sean M. Segreti
Blase Ur
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Published in:
CHI (2014)
Keyphrases
</>
user authentication
sensitive data
security issues
multi party
authentication scheme
data sets
information security
security requirements
security mechanisms
long sequences
wireless sensor networks
authentication protocol
cryptographic protocols
stream cipher
graphical password
covert channel