USEC: Lecture 3: User Authentication - 1
Lecture Slides
See attached file
Materials
Reading for the lecture:
- Ur, B., Kelley, P.G., Komanduri, S., Lee, J., Maass, M., Mazurek, M.L., Passaro, T., Shay, R., Vidas, T., Bauer, L. and Christin, N., 2012. How does your password measure up? The effect of strength meters on password creation. In 21st USENIX security symposium (USENIX Security 12) (pp. 65-80).
- Bonneau, J., Herley, C., Van Oorschot, P.C. and Stajano, F., 2012, May. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In 2012 IEEE Symposium on Security and Privacy (pp. 553-567). IEEE.
- Ur, B., Bees, J., Segreti, S.M., Bauer, L., Christin, N. and Cranor, L.F., 2016, May. Do users' perceptions of password security match reality?. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 3748-3760).
Take-home
- (Blog) Stephenson, S., Pal, B., Fan, S., Fernandes, E., Zhao, Y. and Chatterjee, R., 2022, May. Sok: Authentication in augmented and virtual reality. In 2022 IEEE Symposium on Security and Privacy (SP) (pp. 267-284). IEEE.
- (Blog) The Register -- Fortinet: FortiGate config leaks are genuine but misleading
- Adams, Anne, and Martina Angela Sasse. "Users are not the enemy." Communications of the ACM 42.12 (1999): 40-46.
License
All rights reserved The University of Edinburgh