We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Password guessers under a microscope: an in-depth analysis to inform deployments

    Password guessers are instrumental for assessing the strength of passwords. Despite their diversity and abundance, comparisons between password...

    Zach Parish, Connor Cushing, ... Julie Thorpe in International Journal of Information Security
    Article 23 August 2021
  2. A Novel Metric for Password Security Risk Against Dictionary Attacks

    Passwords are still the most used method of user authentication in the usage of information systems, and they have an important role in practical...
    Binh Le Thanh Thai, Hidema Tanaka in Information Security Applications
    Conference paper 2023
  3. Pi**: Password Inspiration by Exploring Information

    Passwords, a first line of defense against unauthorized access, must be secure and memorable. However, people often struggle to create secure...
    Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe in Information and Communications Security
    Conference paper 2023
  4. HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks

    Honeywords are fictitious passwords inserted into databases in order to identify password breaches. Producing honeywords that are difficult to...
    Fangyi Yu, Miguel Vargas Martin in Security and Trust Management
    Conference paper 2023
  5. Using Amnesia to Detect Credential Database Breaches

    Known approaches for using decoy passwords (honeywords) to detect credential database breaches suffer from the need for a trusted component to...
    Ke Coby Wang, Michael K. Reiter in Cyber Deception
    Chapter Open access 2023
  6. Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization

    While other authentication methods exist, passwords are still the dominant way for user authentication and system security. Over the years, passwords...

    Article 12 April 2019
  7. A password less authentication protocol for multi-server environment using physical unclonable function

    Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...

    E. Praveen Kumar, S. Priyanka in The Journal of Supercomputing
    Article 21 June 2023
  8. Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining

    In this paper, we describe and evaluate how the learning framework ContextBased MicroTraining (CBMT) can be used to assist users to create strong...
    Joakim Kävrestad, Marcus Nohlberg in ICT Systems Security and Privacy Protection
    Conference paper 2020
  9. A 1D coupled hyperbolic tangent chaotic map with delay and its application to password generation

    This paper proposes a new one-dimensional chaotic map. The map consists of a coupling between two hyperbolic tangent terms, where the second term is...

    Ioannis Kafetzis, Lazaros Moysis, ... Christos Volos in Multimedia Tools and Applications
    Article 27 August 2022
  10. Spreading cybersecurity awareness via gamification: zero-day game

    This research project aims to increase the employees' cybersecurity awareness by proposing a training program that consists of pre-game and post-game...

    Fadi Abu-Amara, Reem Al Hosani, ... Baraka Al Hamdi in International Journal of Information Technology
    Article 24 March 2024
  11. Who Goes There?

    We can’t go much further in this book without discussing passwords. I hate passwords. I hate them with a passion. And I know I’m not alone. But...
    Chapter 2023
  12. MT-office: parallel password recovery program for office on domestic heterogeneous multi-core processor

    With the improvement of security awareness, in order to guarantee information security, more advanced and secure encryption algorithms are applied to...

    Yongtao Luo, Bo Yang, ... Chunye Gong in CCF Transactions on High Performance Computing
    Article 04 July 2023
  13. Pressure Tactile Feedback Pin Pad Module Application: Reduce Shoulder Surfing Success Rate

    Automated teller machines (ATMs), self-service payment terminals, and other devices that use PIN passwords for user authentication are susceptible to...
    Hsu Feng Chang, Shyang Jye Chang in HCI International 2023 Posters
    Conference paper 2023
  14. Authentication System Based on Zero-Knowledge Proof Employing the Rabin Cryptosystem and a Secret Sharing Schema

    Passwords play a significant role in the authentication process for web applications. These applications are widely employed to deliver a diverse...
    Sajjad Mohammed Shlaka, Hala Bahjat Abdul Wahab in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  15. Stronger Authentication

    Different methods of authentication are not considered equal. The static passwords that still enable access to many Internet services are considered...
    Yvonne Wilson, Abhishek Hingnikar in Solving Identity Management in Modern Applications
    Chapter 2023
  16. Picture superiority effect in authentication systems for the blind and visually impaired on a smartphone platform

    Pictures are more likely to be remembered than words or text. For smartphone authentication, graphical password interfaces employing both visual...

    Yean Li Ho, Siong Hoe Lau, Afizan Azman in Universal Access in the Information Society
    Article 11 October 2022
  17. BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS

    Biometric cryptosystem (BCS) is an emerging field which performs user authentication in a secured environment. User authentication is handled using...

    Prabhjot Kaur, Nitin Kumar in Cluster Computing
    Article 22 September 2023
  18. Quantifying User Password Exposure to Third-Party CDNs

    Web services commonly employ Content Distribution Networks (CDNs) for performance and security. As web traffic is becoming 100% HTTPS, more and more...
    Rui **n, Shihan Lin, **aowei Yang in Passive and Active Measurement
    Conference paper 2023
  19. Pattern lock screen detection method based on lightweight deep feature extraction

    In the digital age, many people have used mobile phones, thus, mobile phones are one of the most commonly used crime tools. Users can take security...

    Fatih Ertam, Omer Faruk Yakut, Turker Tuncer in Neural Computing and Applications
    Article 30 September 2022
  20. Traditional Authentication

    The paradigm for user authentication has not greatly changed since computers came to market; many systems still rely on passwords. This chapter...
    Chapter 2024
Did you find what you were looking for? Share feedback.