Search
Search Results
-
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution
Keyboard patterns are widely used in password construction, as they can be easily memorized with the aid of positions on the keyboard. Consequently,... -
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection
Nowadays, the graphical password has gained significant recognition and has become a subject of extensive investigation within the research...
-
A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022
The disadvantages of traditional text-based user authentication methods include the inability to remember lengthy passwords, the ease with which they...
-
Enhancing graphical password authentication system with deep learning-based arabic digit recognition
The purpose of this research paper is to introduce a new graphical password system that combines the strengths of traditional passwords, such as...
-
Effectiveness of Some Tests of Spatial Randomness in the Detection of Weak Graphical Passwords in Passpoint
This paper explores the usability of the Ripley’s K function and the nearest neighbor distance, in the detection of clustered graphical passwords in... -
Hands-free multi-type character text entry in virtual reality
Multi-type characters, including uppercase and lowercase letters, symbols, and numbers, are essential in text entry activities. Although multi-type...
-
Performance evaluation of Cuckoo filters as an enhancement tool for password cracking
Cyberthreats continue their expansion, becoming more and more complex and varied. However, credentials and passwords are still a critical point in...
-
Implicit authentication with sensor normalization and multi-modal domain adaption based on mobile crowd sensing
Pattern lock, an effective and convenient authentication mechanism, has been widely used in smart devices to resist malicious attacks. However,...
-
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords
In the Internet of things (IoT), traffic often goes via middleboxes, such as brokers or virtual private network (VPN) gateways, thereby increasing... -
The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords
Passwords remains the standard mechanism by which organisations protect their data from unauthorised entities accessing, changing or misusing their... -
PassGPT: Password Modeling and (Guided) Generation with Large Language Models
Large language models (LLMs) successfully model natural language from vast amounts of text without the need for explicit supervision. In this paper,... -
Accessible password strength assessment method for visually challenged users
Text-based password authentication is the most common password authentication in the digital space. People often need help to create secure and...
-
Bu-Dash: a universal and dynamic graphical password scheme (extended version)
Passwordless authentication is a trending theme in cyber security, while biometrics gradually replace knowledge-based schemes. However, Personal...
-
Authentication & Restricting Access: Strong Passwords & Two-Factor Auth
In Part 5, we explain how to choose a strong password or passphrase and why two-factor authentication adds valuable defense in depth. -
Manipulable, reversible and diversified de-identification via face identity disentanglement
Face de-identification has always been a focal point in privacy-preserving research. Most existing de-identification methods focus only on the...
-
PassMon: A Technique for Password Generation and Strength Estimation
The password is the most prevalent and reliant mode of authentication by date. We often come across many websites with user registration pages having...
-
Robust password security: a genetic programming approach with imbalanced dataset handling
Develo** a method for determining password strength using artificial intelligence (AI) is crucial as it enhances cybersecurity by providing a more...
-
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things
Password-based authentication is widely applied in Internet of Things (IoT) to resist unauthorized access. However, choices of weak passwords,... -
Empowering Users: Leveraging Interface Cues to Enhance Password Security
Passwords are a popular means of authentication for online accounts, but users struggle to compose and remember numerous passwords, resorting to... -
ENCRYPTO: A Reliable and Efficient Mobile App for Password Management
Passwords and weak secrets are frequently used as cryptographic keys in security protocols. Despite users’ attempts to secure their data with system...