|  | Introduction to User Authentication II | 
										
											| No reviews need | Password Security: A Case History Robert Morris, Ken Thompson [CACM 1979]
 | 
										    					                                        						| to be submitted | The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano [Oakland 2012]
 | 
											
										    					                                          						| for these papers | Passwords and the Evolution of Imperfect Authentication Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano [CACM 2015]
 | 
										
											|  | Advice on Giving Technical Presentations | 
										
											|  | Sample Project Topics | 
											
											
												| Sep 23 | Passwords in the real world |