default search action
Julie Thorpe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe:
PiXi: Password Inspiration by Exploring Information. ICICS 2023: 249-266 - [c23]Samira Zibaei, Amirali Salehi-Abari, Julie Thorpe:
Dissecting Nudges in Password Managers: Simple Defaults are Powerful. SOUPS 2023: 211-225 - [i7]Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe:
PiXi: Password Inspiration by Exploring Information. CoRR abs/2304.10728 (2023) - 2022
- [j9]Zach Parish, Connor Cushing, Shourya Aggarwal, Amirali Salehi-Abari, Julie Thorpe:
Password guessers under a microscope: an in-depth analysis to inform deployments. Int. J. Inf. Sec. 21(2): 409-425 (2022) - [c22]Alireza A. Namanloo, Julie Thorpe, Amirali Salehi-Abari:
Improving Peer Assessment with Graph Neural Networks. EDM 2022 - [c21]Samira Zibaei, Dinah Rinoa Malapaya, Benjamin Mercier, Amirali Salehi-Abari, Julie Thorpe:
Do Password Managers Nudge Secure (Random) Passwords? SOUPS @ USENIX Security Symposium 2022: 581-597 - 2021
- [j8]Zach Parish, Amirali Salehi-Abari, Julie Thorpe:
A study on priming methods for graphical passwords. J. Inf. Secur. Appl. 62: 102913 (2021) - [j7]Rafael Veras, Christopher Collins, Julie Thorpe:
A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords. ACM Trans. Priv. Secur. 24(3): 20:1-20:21 (2021) - [c20]Christopher Bonk, Zach Parish, Julie Thorpe, Amirali Salehi-Abari:
Long Passphrases: Potentials and Limits. PST 2021: 1-7 - [i6]Zach Parish, Amirali Salehi-Abari, Julie Thorpe:
A Study on Priming Methods for Graphical Passwords. CoRR abs/2103.09262 (2021) - [i5]Christopher Bonk, Zach Parish, Julie Thorpe, Amirali Salehi-Abari:
Long Passphrases: Potentials and Limits. CoRR abs/2110.08971 (2021) - [i4]Alireza A. Namanloo, Julie Thorpe, Amirali Salehi-Abari:
Improving Peer Assessment with Graph Convolutional Networks. CoRR abs/2111.04466 (2021) - 2020
- [i3]Zach Parish, Connor Cushing, Shourya Aggarwal, Amirali Salehi-Abari, Julie Thorpe:
Password Guessers Under a Microscope: An In-Depth Analysis to Inform Deployments. CoRR abs/2008.07986 (2020)
2010 – 2019
- 2019
- [j6]Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to. Int. J. Inf. Sec. 18(2): 239-255 (2019) - [j5]Ruba AlOmari, Julie Thorpe:
On password behaviours and attitudes in different populations. J. Inf. Secur. Appl. 45: 79-89 (2019) - [c19]Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari:
Towards models for quantifying the known adversary. NSPW 2019: 103-117 - [c18]Alaadin Addas, Amirali Salehi-Abari, Julie Thorpe:
Geographical Security Questions for Fallback Authentication. PST 2019: 1-6 - [c17]Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari:
Geographic Hints for Passphrase Authentication. PST 2019: 1-9 - [i2]Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari:
Geographical Security Questions for Fallback Authentication. CoRR abs/1907.00998 (2019) - 2018
- [c16]Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
Reinforcing System-Assigned Passphrases Through Implicit Learning. CCS 2018: 1533-1548 - 2017
- [c15]Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
System-Assigned Passwords You Can't Write Down, But Don't Need To. PST 2017: 137-146 - 2016
- [j4]Brent MacRae, Amirali Salehi-Abari, Julie Thorpe:
An Exploration of Geographic Authentication Schemes. IEEE Trans. Inf. Forensics Secur. 11(9): 1997-2012 (2016) - 2014
- [c14]Julie Thorpe, Muath Al-Badawi, Brent MacRae, Amirali Salehi-Abari:
The presentation effect on graphical passwords. CHI 2014: 2947-2950 - [c13]Rafael Veras, Christopher Collins, Julie Thorpe:
On Semantic Patterns of Passwords and their Security Impact. NDSS 2014 - [c12]Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin:
Crypto-assistant: Towards facilitating developer's encryption of sensitive data. PST 2014: 342-346 - 2013
- [c11]Julie Thorpe, Brent MacRae, Amirali Salehi-Abari:
Usability and security evaluation of GeoPass: a geographic location-password scheme. SOUPS 2013: 14:1-14:14 - 2012
- [c10]Julie Thorpe, Amirali Salehi-Abari, Robert Burden:
Video-passwords: advertising while authenticating. NSPW 2012: 127-140 - [c9]Rafael Veras, Julie Thorpe, Christopher Collins:
Visualizing semantics in passwords: the role of dates. VizSEC 2012: 88-95 - 2011
- [j3]Paul C. van Oorschot, Julie Thorpe:
Exploiting predictability in click-based graphical passwords. J. Comput. Secur. 19(4): 669-702 (2011) - [c8]Shahram Heydari, Walid Rjaibi, Khalil El-Khatib, Julie Thorpe:
Privacy and security of smart grid communication. CASCON 2011: 345-346 - 2010
- [j2]Paul C. van Oorschot, Amirali Salehi-Abari, Julie Thorpe:
Purely automated attacks on passpoints-style graphical passwords. IEEE Trans. Inf. Forensics Secur. 5(3): 393-405 (2010) - [c7]Khalil El-Khatib, Patrick Hung, Julie Thorpe, Walid Rjaibi:
Cybersecurity issues for businesses. CASCON 2010: 364-365
2000 – 2009
- 2008
- [j1]Paul C. van Oorschot, Julie Thorpe:
On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur. 10(4): 5:1-5:33 (2008) - [c6]Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot:
On Purely Automated Attacks and Click-Based Graphical Passwords. ACSAC 2008: 111-120 - 2007
- [c5]Julie Thorpe, Paul C. van Oorschot:
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. USENIX Security Symposium 2007 - 2005
- [c4]Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396 - [c3]Julie Thorpe, Paul C. van Oorschot, Anil Somayaji:
Pass-thoughts: authenticating with our minds. NSPW 2005: 45-56 - [i1]Julie Thorpe, Paul C. van Oorschot, Anil Somayaji:
Pass-thoughts: Authenticating With Our Minds. IACR Cryptol. ePrint Arch. 2005: 121 (2005) - 2004
- [c2]Julie Thorpe, Paul C. van Oorschot:
Towards Secure Design Choices for Implementing Graphical Passwords. ACSAC 2004: 50-60 - [c1]Julie Thorpe, Paul C. van Oorschot:
Graphical Dictionaries and the Memorable Space of Graphical Passwords. USENIX Security Symposium 2004: 135-150
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint