Search
Search Results
-
Password guessers under a microscope: an in-depth analysis to inform deployments
Password guessers are instrumental for assessing the strength of passwords. Despite their diversity and abundance, comparisons between password...
-
A Novel Metric for Password Security Risk Against Dictionary Attacks
Passwords are still the most used method of user authentication in the usage of information systems, and they have an important role in practical... -
Pi**: Password Inspiration by Exploring Information
Passwords, a first line of defense against unauthorized access, must be secure and memorable. However, people often struggle to create secure... -
HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks
Honeywords are fictitious passwords inserted into databases in order to identify password breaches. Producing honeywords that are difficult to... -
Using Amnesia to Detect Credential Database Breaches
Known approaches for using decoy passwords (honeywords) to detect credential database breaches suffer from the need for a trusted component to... -
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization
While other authentication methods exist, passwords are still the dominant way for user authentication and system security. Over the years, passwords...
-
A password less authentication protocol for multi-server environment using physical unclonable function
Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...
-
Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining
In this paper, we describe and evaluate how the learning framework ContextBased MicroTraining (CBMT) can be used to assist users to create strong... -
A 1D coupled hyperbolic tangent chaotic map with delay and its application to password generation
This paper proposes a new one-dimensional chaotic map. The map consists of a coupling between two hyperbolic tangent terms, where the second term is...
-
Spreading cybersecurity awareness via gamification: zero-day game
This research project aims to increase the employees' cybersecurity awareness by proposing a training program that consists of pre-game and post-game...
-
Who Goes There?
We can’t go much further in this book without discussing passwords. I hate passwords. I hate them with a passion. And I know I’m not alone. But... -
MT-office: parallel password recovery program for office on domestic heterogeneous multi-core processor
With the improvement of security awareness, in order to guarantee information security, more advanced and secure encryption algorithms are applied to...
-
Pressure Tactile Feedback Pin Pad Module Application: Reduce Shoulder Surfing Success Rate
Automated teller machines (ATMs), self-service payment terminals, and other devices that use PIN passwords for user authentication are susceptible to... -
Authentication System Based on Zero-Knowledge Proof Employing the Rabin Cryptosystem and a Secret Sharing Schema
Passwords play a significant role in the authentication process for web applications. These applications are widely employed to deliver a diverse... -
Stronger Authentication
Different methods of authentication are not considered equal. The static passwords that still enable access to many Internet services are considered... -
Picture superiority effect in authentication systems for the blind and visually impaired on a smartphone platform
Pictures are more likely to be remembered than words or text. For smartphone authentication, graphical password interfaces employing both visual...
-
BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS
Biometric cryptosystem (BCS) is an emerging field which performs user authentication in a secured environment. User authentication is handled using...
-
Quantifying User Password Exposure to Third-Party CDNs
Web services commonly employ Content Distribution Networks (CDNs) for performance and security. As web traffic is becoming 100% HTTPS, more and more... -
Pattern lock screen detection method based on lightweight deep feature extraction
In the digital age, many people have used mobile phones, thus, mobile phones are one of the most commonly used crime tools. Users can take security...
-
Traditional Authentication
The paradigm for user authentication has not greatly changed since computers came to market; many systems still rely on passwords. This chapter...