%0 Journal Article
%1 bonneau2015passwords
%A Bonneau, Joseph
%A Herley, Cormac
%A van Oorschot, Paul C.
%A Stajano, Frank
%C New York, NY, USA
%D 2015
%I ACM
%J Communications of the ACM
%K authentication password security
%N 7
%P 78--87
%R 10.1145/2699390
%T Passwords and the Evolution of Imperfect Authentication
%U http://doi.acm.org/10.1145/2699390
%V 58
%X Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.
@article{bonneau2015passwords,
abstract = {Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.},
acmid = {2699390},
added-at = {2015-09-17T08:26:13.000+0200},
address = {New York, NY, USA},
author = {Bonneau, Joseph and Herley, Cormac and van Oorschot, Paul C. and Stajano, Frank},
biburl = {https://www.bibsonomy.org/bibtex/210d0ceb988f019efd606f18be824aac9/jaeschke},
doi = {10.1145/2699390},
interhash = {1a669934a839dd424f2f58cd54df7fbb},
intrahash = {10d0ceb988f019efd606f18be824aac9},
issn = {0001-0782},
issue_date = {July 2015},
journal = {Communications of the ACM},
keywords = {authentication password security},
month = jun,
number = 7,
numpages = {10},
pages = {78--87},
publisher = {ACM},
timestamp = {2015-09-17T08:26:13.000+0200},
title = {Passwords and the Evolution of Imperfect Authentication},
url = {http://doi.acm.org/10.1145/2699390},
volume = 58,
year = 2015
}