Sciweavers

31 search results - page 7 / 7
» Weak Links, Strong Ties
Sort
View
SOUPS
2010
ACM
15 years 1 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley