An unexpectedly large count of trees in the West African Sahara and Sahel

M Brandt, CJ Tucker, A Kariryaa, K Rasmussen, C Abel… - Nature, 2020 - nature.com
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

Social authentication applications, attacks, defense strategies and future research directions: a systematic review

N Alomar, M Alsaleh, A Alarifi - IEEE Communications Surveys …, 2017 - ieeexplore.ieee.org
The ever-increasing volumes of social knowledge shared in online social networks, the
establishment of trustworthy social relationships over these platforms, and the emergence of …

[PDF][PDF] The Password Thicket: Technical and Market Failures in Human Authentication on the Web.

J Bonneau, S Preibusch - WEIS, 2010 - jbonneau.com
We report the results of the first large-scale empirical analysis of password implementations
deployed on the Internet. Our study included 150 websites which offer free user accounts for …

Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education

T Denning, A Lerner, A Shostack, T Kohno - Proceedings of the 2013 …, 2013 - dl.acm.org
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop
card game created to raise awareness of and alter perceptions regarding-computer security …

Evolución de los servicios de redes sociales en internet

M Ros-Martín - Profesional de la información, 2009 - revista.profesionaldelainformacion …
Se expone una breve evolución histórica de los servicios de redes sociales que han surgido
en internet bajo el concepto de web social, incidiendo en los ejemplos más significativos de …

Multiple password interference in text passwords and click-based graphical passwords

S Chiasson, A Forget, E Stobert… - Proceedings of the 16th …, 2009 - dl.acm.org
The underlying issues relating to the usability and security of multiple passwords are largely
unexplored. However, we know that people generally have difficulty remembering multiple …

Using social information for authenticating a user session

LJ Shepard, W Chen, T Perry, L Popov - US Patent 8,910,251, 2014 - Google Patents
(57) ABSTRACT A social CAPTCHA is presented to authenticate a member of the social
network. The social CAPTCHA includes one or more challenge questions based on …

Systems, methods and apparatus for controlling access to mobile devices

CR Crawford, JS Nell - US Patent 8,346,217, 2013 - Google Patents
US8346217B2 - Systems, methods and apparatus for controlling access to mobile devices -
Google Patents US8346217B2 - Systems, methods and apparatus for controlling access to mobile …

It's no secret. measuring the security and reliability of authentication via “secret” questions

S Schechter, AJB Brush… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
All four of the most popular webmail providers-AOL, Google, Microsoft, and Yahoo!-rely on
personal questions as the secondary authentication secrets used to reset account …