Search
Search Results
-
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities
Password manager and vault applications can be used by users to select strong passwords as well as storing user credentials locally or in the cloud.... -
Password Generation Based on Song Lyrics and Its Management
This paper focuses on creating a Password Manager which is secure and easy-to-remember. Password managers prove efficient in generating and storing... -
Session-Based Resource Access
This segment describes how web site keep uses logged in between requests by sending session IDs or access tokens. It also explains the advantages of... -
Learning Password Modification Patterns with Recurrent Neural Networks
The majority of online services continue their reliance on text-based passwords as the primary means of user authentication. With a growing number of... -
Analysis of Country and Regional User Password Characteristics in Dictionary Attacks
The degree to which passwords are robust to guessing has become one of the fundamental interests in password research. For example, a method has been... -
Deep learning-based biometric cryptographic key generation with post-quantum security
In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on...
-
A Hybrid Machine Learning Technique for Multiple Soft Biometric Based Dynamic Keystroke Pattern Recognition System
Recently, the keystroke biometric authentication system is the notable research area because of it is low cost and flexible integration support....
-
Privacy and Security Perceptions in Augmented Cognition Applications
Perceptions of security and privacy influence users’ behavior with security mechanisms such as passwords and multifactor authentication. Users tend... -
Choosing Wordlists for Password Guessing: An Adaptive Multi-armed Bandit Approach
A password guesser often uses wordlists (e.g. lists of previously leaked passwords, dictionaries of words in different languages, and lists of the... -
Password Challenges for Older People in China and the United Kingdom
As vital services are moving increasingly online, it is important that everyone, including older people, can access them. Both high risk and many low... -
A Security Analysis of Password Managers on Android
Password Managers are software tools designed to help users easily store and access credentials across devices while also reducing, if not... -
Password based authentication for web based graphics computing services retrieval in cloud
In the global environment privacy and security issues were critical to handle the huge number of participants. Many security-based research works...
-
User Authentication—Passwords,Biometrics and Alternatives
Computer users regularly enter a username and password to access a local device or remote account. Authentication is the process of using supporting... -
Authentication Technology
In this chapter, you will learn about how parties (typically human parties) can be identified to a computer system. This process is called... -
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
Passwords are stored in the form of salted one-way hashes so that attacks on servers cannot leak them in the clear. However, humans tend to select... -
SePass: Semantic Password Guessing Using k-nn Similarity Search in Word Embeddings
Password guessing describes the process of finding a password for a secured system. Use cases include password recovery, IT forensics and measuring... -
Introduction
In 2009, hackers obtained user credentials of over 30 million users of mobile game publisher RockYou. They exploited a SQL injection vulnerability to... -
GazeRoomLock: Using Gaze and Head-Pose to Improve the Usability and Observation Resistance of 3D Passwords in Virtual Reality
Authentication has become an important component of Immersive Virtual Reality (IVR) applications, such as virtual shop** stores, social networks,... -
The importance of social identity on password formulations
Passwords are regarded as the most common authentication mechanism used by Web-based services, despite large-scale attacks and data breaches...
-
A service-categorized security scheme with physical unclonable functions for internet of vehicles
In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside....