|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 35 occurrences of 33 keywords
|
|
|
Results
Found 28 publication records. Showing 28 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
105 | Marlene R. Pratto |
Toward a uniform user interface at UNCG. |
SIGUCCS |
1989 |
DBLP DOI BibTeX RDF |
|
89 | Benjamin M. Gross, Elizabeth F. Churchill |
Addressing constraints: multiple usernames task spillage and notions of identity. |
CHI Extended Abstracts |
2007 |
DBLP DOI BibTeX RDF |
interview study, usernames, collaboration, instant messaging, email, identity, task, identifier |
63 | William P. Murphy III |
EMS: a homegrown identity management system. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
HR, peoplesoft, username, web, email, identity, website, web-based, PHP, inventory, MySQL, human resources, ID, employee |
32 | Adam Coates 0003 |
Academic journals' usernames and the threat of fraudulent accounts on social media. |
Learn. Publ. |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Eva Anastasiadi, Elias Athanasopoulos, Evangelos P. Markatos |
The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. |
SECRYPT |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Önder Çoban |
An Analysis on Identifying Real Names of Users from Usernames. |
SIU |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Solomiia Fedushko, Yuriy Syerov, Oleksandr Skybinskyi, Nataliya Shakhovska, Zoryana Kunch |
Efficiency of Using Utility for Usernames Verification in Online Community Management. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
32 | Md. Mahmudur Rahman, Shahadat Hossain, Mimun Barid, Md. Manzurul Hasan |
Inductions of Usernames' Strengths in Reducing Invasions on Social Networking Sites (SNSs). |
ICO |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Peter Saint-Andre, Alexey Melnikov 0001 |
Preparation, Enforcement, and Comparison of Internationalized Strings Representing Usernames and Passwords. |
RFC |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Yubin Wang, Tingwen Liu, Qingfeng Tan, Jinqiao Shi, Li Guo 0001 |
Identifying Users across Different Sites using Usernames. |
ICCS |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Gabriella M. Harari, Lindsay T. Graham, Samuel D. Gosling |
Personality Impressions of World of Warcraft Players Based on Their Avatars and Usernames: Consensus but No Accuracy. |
Int. J. Gaming Comput. Mediat. Simulations |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Peter Saint-Andre, Alexey Melnikov 0001 |
Preparation, Enforcement, and Comparison of Internationalized Strings Representing Usernames and Passwords. |
RFC |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils |
How Unique and Traceable are Usernames? |
CoRR |
2011 |
DBLP BibTeX RDF |
|
32 | Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils |
How Unique and Traceable Are Usernames? |
PETS |
2011 |
DBLP DOI BibTeX RDF |
|
32 | Karen M. Cornetto, Kristine L. Nowak |
Utilizing Usernames for Sex Categorization in Computer-Mediated Communication: Examining Perceptions and Accuracy. |
Cyberpsychology Behav. Soc. Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Adam Moskowitz |
On Choosing Usernames. |
login Usenix Mag. |
2003 |
DBLP BibTeX RDF |
|
21 | Huajun Huang, Shaohong Zhong, Junshan Tan |
Browser-Side Countermeasures for Deceptive Phishing Attack. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb |
Pharewell to Phishing. |
SSS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Naveen Agarwal, Scott G. Renfro, Arturo Bejar |
Phishing Forbidden. |
ACM Queue |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Ramsbrock, Robin Berthier, Michel Cukier |
Profiling Attacker Behavior Following SSH Compromises. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh |
Phishing attacks and solutions. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP |
21 | Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh 0001 |
Using the mobile phone as a security token for unified authentication. |
ICSNC |
2007 |
DBLP DOI BibTeX RDF |
authentcation, mobility |
21 | Nick Bartlow, Bojan Cukic |
Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. |
ISSRE |
2006 |
DBLP DOI BibTeX RDF |
|
21 | John P. Watt, Oluwafemi O. Ajayi, Jipu Jiang, Jos Koetsier, Richard O. Sinnott |
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education. |
CCGRID |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Jakob E. Bardram |
The trouble with login: on usability and computer security in ubiquitous computing. |
Pers. Ubiquitous Comput. |
2005 |
DBLP DOI BibTeX RDF |
Electronic patient record (EPR), Ubiquitous computing, Computer-supported cooperative work (CSCW), Healthcare, User authentication, Hospitals, Activity-based computing (ABC), Login |
21 | Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen |
Graphical Passwords: A Survey. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | David J. Scott, Richard Sharp |
Specifying and Enforcing Application-Level Web Security Policies. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
Application-level Web security, security policy description languages, component-based design |
21 | Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer |
On secure and pseudonymous client-relationships with multiple servers. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
Janus function, mailbox, persistent relationship, privacy, anonymity, pseudonym |
Displaying result #1 - #28 of 28 (100 per page; Change: )
|
|