Sciweavers

SOUPS
2010
ACM
14 years 4 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley
CHI
2010
ACM
14 years 5 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse