Published on in Vol 14, No 1 (2012): Jan-Feb

How to Create Memorizable and Strong Passwords

How to Create Memorizable and Strong Passwords

How to Create Memorizable and Strong Passwords

Journals

  1. Mamonov S, Benbunan-Fich R. The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior 2018;83:32 View
  2. Cipresso P, Mauri M, Semonella M, Tuena C, Balgera A, Villamira M, Riva G. Looking at One's Self Through Facebook Increases Mental Stress: A Computational Psychometric Analysis by Using Eye-Tracking and Psychophysiology. Cyberpsychology, Behavior, and Social Networking 2019;22(5):307 View
  3. Pietro C, Silvia S, Giuseppe R. The Pursuit of Happiness Measurement: A Psychometric Model Based on Psychophysiological Correlates. The Scientific World Journal 2014;2014:1 View
  4. Brumen B, Heričko M, Rozman I, Hölbl M. Security Analysis and Improvements to the PsychoPass Method. Journal of Medical Internet Research 2013;15(8):e161 View
  5. Cipresso P, Serino S, Gaggioli A, Albani G, Mauro A, Riva G. Psychometric modeling of the pervasive use of Facebook through psychophysiological measures: Stress or optimal experience?. Computers in Human Behavior 2015;49:576 View
  6. Brumen B. System-Assigned Passwords: The Disadvantages of the Strict Password Management Policies. Informatica 2020:459 View
  7. Brumen B. Security analysis of Game Changer Password System. International Journal of Human-Computer Studies 2019;126:44 View
  8. Cipresso P, Albani G, Serino S, Pedroli E, Pallavicini F, Mauro A, Riva G. Virtual multiple errands test (VMET): a virtual reality-based tool to detect early executive functions deficit in Parkinson’s disease. Frontiers in Behavioral Neuroscience 2014;8 View
  9. Alanazi H, Zaidan A, Zaidan B, Kiah M, Al-Bakri S. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. Journal of Medical Systems 2015;39(1) View
  10. Bošnjak L, Brumen B. Shoulder surfing: From an experimental study to a comparative framework. International Journal of Human-Computer Studies 2019;130:1 View
  11. Cipresso P, Paglia F, Cascia C, Riva G, Albani G, La Barbera D. Break in volition: a virtual reality study in patients with obsessive-compulsive disorder. Experimental Brain Research 2013;229(3):443 View
  12. Cucoranu I, Parwani A, West A, Romero-Lauro G, Nauman K, Carter A, Balis U, Tuthill M, Pantanowitz L. Privacy and security of patient data in the pathology laboratory. Journal of Pathology Informatics 2013;4(1):4 View
  13. Andelić N, Baressi S̆egota S, Car Z. Robust password security: a genetic programming approach with imbalanced dataset handling. International Journal of Information Security 2024;23(3):1761 View

Books/Policy Documents

  1. Adeliyi T, Singh A, Oluwadele D. Intelligent Sustainable Systems. View