Abstract
There is an authentication plague upon the land. We have to claim and assert our identity repeatedly to a host of authentication trolls, each jealously guarding an Internet service of some sort. Each troll has specific rules for passwords, and the rules vary widely and incomprehensibly.
- Cheswick, W. 2012; http://www.cheswick.com/ches/papers/std-002-results.xls; and http://www.cheswick.com/ches/papers/std-002-results.numbers.Google Scholar
- Department of Defense Computer Security Center. 1985. Password Management Guideline. TechnicalReport CSC-STD-002-85.Google Scholar
- Florêncio, D., Herley, C. 2012. Is everything we know about password stealing wrong? IEEE Securityand Privacy PP(99). DOI 10.1109/MSP.2012.57. Google ScholarDigital Library
- Florêncio, D., Herley, C. 2012. Where do security policies come from?. Proceedings of the SixthSymposium on Usable Privacy and Security (SOUPS '10). ACM, New York, NY, USA, Article 10, 14pages. DOI 10.1145/1837110.1837124. http://doi.acm.org/10.1145/1837110.1837124. Google ScholarDigital Library
- xkcd; http://xkcd.com/936/.Google Scholar
Comments