Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

2.2 User password management
2.3 Improved cryptographic protocols
2.4 Improving password entry
2.5 Single sign-on and related systems
2.6 Automated Password Management
2.7 Password implementation standards
2.8 Empirical studies of web security
3 Methodology
3.1 Research questions
3.2 Selection of sites
3.3 Evaluation process
3.4 Supplemental data
4 Data collected
4.1 Site features
4.2 Enrolment requirements
4.3 Password registration
4.4 Login
4.5 Federated identity
4.6 Password update
4.7 Password recovery
4.8 Rate limiting for password guessing
4.9 Prevention of user probing
4.10 Encryption and authentication
5 Analysis
5.1 User experience
5.2 Security weaknesses
5.3 Security performance and market position
5.4 Security motivations
5.5 Password deployment motivations
6 Economic interpretations
6.1 Password security as a tragedy of the commons
6.2 Password insecurity as a negative externality
6.3 Possible regulatory solutions
6.4 Alternative explanations
7 Conclusions and perspectives
0 of .
Results for:
No results containing your search query
P. 1
The Password Thicket_technical and Market Failure in Human Authentication on the Web

The Password Thicket_technical and Market Failure in Human Authentication on the Web

Ratings: (0)|Views: 18|Likes:
Published by mihailescu_marius

More info:

Published by: mihailescu_marius on Aug 15, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 48 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->