We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 10,000 results
  1. Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution

    Keyboard patterns are widely used in password construction, as they can be easily memorized with the aid of positions on the keyboard. Consequently,...
    Kunyu Yang, Xuexian Hu, ... Wenfen Liu in Information and Communications Security
    Conference paper 2021
  2. GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection

    Nowadays, the graphical password has gained significant recognition and has become a subject of extensive investigation within the research...

    Palash Ray, Debasis Giri, ... Soumyadeep Hore in Multimedia Tools and Applications
    Article 12 December 2023
  3. A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022

    The disadvantages of traditional text-based user authentication methods include the inability to remember lengthy passwords, the ease with which they...

    Kailash Chandra Mishra, Subrata Dutta in International Journal of Information Security
    Article 05 December 2022
  4. Enhancing graphical password authentication system with deep learning-based arabic digit recognition

    The purpose of this research paper is to introduce a new graphical password system that combines the strengths of traditional passwords, such as...

    Areeg Fahad Rasheed, M. Zarkoosh, F. R. Elia in International Journal of Information Technology
    Article 13 October 2023
  5. Effectiveness of Some Tests of Spatial Randomness in the Detection of Weak Graphical Passwords in Passpoint

    This paper explores the usability of the Ripley’s K function and the nearest neighbor distance, in the detection of clustered graphical passwords in...
    Joaquín A. Herrera-Macías, Lisset Suárez-Plasencia, ... Guillermo Sosa-Gómez in Computer Science and Health Engineering in Health Services
    Conference paper 2021
  6. Hands-free multi-type character text entry in virtual reality

    Multi-type characters, including uppercase and lowercase letters, symbols, and numbers, are essential in text entry activities. Although multi-type...

    Tingjie Wan, Rongkai Shi, ... Hai-Ning Liang in Virtual Reality
    Article 03 January 2024
  7. Performance evaluation of Cuckoo filters as an enhancement tool for password cracking

    Cyberthreats continue their expansion, becoming more and more complex and varied. However, credentials and passwords are still a critical point in...

    Maria-Dolores Cano, Antonio Villafranca, Igor Tasic in Cybersecurity
    Article Open access 09 November 2023
  8. Implicit authentication with sensor normalization and multi-modal domain adaption based on mobile crowd sensing

    Pattern lock, an effective and convenient authentication mechanism, has been widely used in smart devices to resist malicious attacks. However,...

    Article 11 October 2022
  9. Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords

    In the Internet of things (IoT), traffic often goes via middleboxes, such as brokers or virtual private network (VPN) gateways, thereby increasing...
    Konrad-Felix Krentz, Thiemo Voigt in Foundations and Practice of Security
    Conference paper 2023
  10. The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords

    Passwords remains the standard mechanism by which organisations protect their data from unauthorised entities accessing, changing or misusing their...
    Paul Brockbanks, Martin J. Butler in Human Aspects of Information Security and Assurance
    Conference paper 2021
  11. PassGPT: Password Modeling and (Guided) Generation with Large Language Models

    Large language models (LLMs) successfully model natural language from vast amounts of text without the need for explicit supervision. In this paper,...
    Javier Rando, Fernando Perez-Cruz, Briland Hitaj in Computer Security – ESORICS 2023
    Conference paper 2024
  12. Accessible password strength assessment method for visually challenged users

    Text-based password authentication is the most common password authentication in the digital space. People often need help to create secure and...

    K. S. Kuppusamy, G. Balayogi in International Journal of Information Security
    Article 14 June 2023
  13. Bu-Dash: a universal and dynamic graphical password scheme (extended version)

    Passwordless authentication is a trending theme in cyber security, while biometrics gradually replace knowledge-based schemes. However, Personal...

    Panagiotis Andriotis, Myles Kirby, Atsuhiro Takasu in International Journal of Information Security
    Article Open access 04 December 2022
  14. Authentication & Restricting Access: Strong Passwords & Two-Factor Auth

    In Part 5, we explain how to choose a strong password or passphrase and why two-factor authentication adds valuable defense in depth.
    Video segment 2021
  15. Manipulable, reversible and diversified de-identification via face identity disentanglement

    Face de-identification has always been a focal point in privacy-preserving research. Most existing de-identification methods focus only on the...

    Di **ao, **gdong **a, ... Maolan Zhang in Multimedia Tools and Applications
    Article 19 February 2024
  16. PassMon: A Technique for Password Generation and Strength Estimation

    The password is the most prevalent and reliant mode of authentication by date. We often come across many websites with user registration pages having...

    Sanjay Murmu, Harsh Kasyap, Somanath Tripathy in Journal of Network and Systems Management
    Article 17 October 2021
  17. Robust password security: a genetic programming approach with imbalanced dataset handling

    Develo** a method for determining password strength using artificial intelligence (AI) is crucial as it enhances cybersecurity by providing a more...

    Nikola Andelić, Sandi Baressi S̆egota, Zlatan Car in International Journal of Information Security
    Article 07 February 2024
  18. An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things

    Password-based authentication is widely applied in Internet of Things (IoT) to resist unauthorized access. However, choices of weak passwords,...
    Changsong Jiang, Chunxiang Xu, Kefei Chen in Information Security and Cryptology
    Conference paper 2024
  19. Empowering Users: Leveraging Interface Cues to Enhance Password Security

    Passwords are a popular means of authentication for online accounts, but users struggle to compose and remember numerous passwords, resorting to...
    Yasmeen Abdrabou, Marco Asbeck, ... Florian Alt in Human-Computer Interaction – INTERACT 2023
    Conference paper 2023
  20. ENCRYPTO: A Reliable and Efficient Mobile App for Password Management

    Passwords and weak secrets are frequently used as cryptographic keys in security protocols. Despite users’ attempts to secure their data with system...
    Urmila Pilania, Manoj Kumar, ... Riya Gaur in Cyber Security and Digital Forensics
    Conference paper 2024
Did you find what you were looking for? Share feedback.