We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Growing Up with Passwords

    Children’s development progresses through developmental stages, but there is little understanding about how these stages impact children’s...
    Sarah Abdi, Elizabeth Stobert in HCI International 2024 Posters
    Conference paper 2024
  2. Zipf’s law analysis on the leaked Iranian users’ passwords

    Textual passwords are one of the most common methods of authentication and an important factor in systems security. Knowing the correct distribution...

    Zeinab Alebouyeh, Amir Jalaly Bidgoly in Journal of Computer Virology and Hacking Techniques
    Article 21 August 2021
  3. Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children’s Password Practices

    Though much is known about how adults understand and use passwords, little research attention has been paid specifically to parents or, more...
    Yee-Yin Choong, Kerrianne Buchanan, Olivia Williams in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2023
  4. Survey of Services that Store Passwords in a Recoverable Manner

    Passwords entered by users in web services and applications are essential and confidential information. Therefore, it is ideal for difficulty storing...
    Kazutoshi Itoh, Akira Kanaoka in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2023
  5. Towards Evaluating the Security of Human Computable Passwords Using Neural Networks

    Passwords are playing a major role for authentication in our daily life. However contemporary passwords are typically either difficult to remember or...
    Issei Murata, Pengju He, ... Kouichi Sakurai in Information Security Applications
    Conference paper 2023
  6. Hashing and Salting of Passwords

    In this chapter we’re going to look at how you should go about securely storing passwords in your database. In most cases these will be passwords...
    Matthew McGiffen in Pro Encryption in SQL Server 2022
    Chapter 2022
  7. One-Time Passwords: A Literary Review of Different Protocols and Their Applications

    Currently, user authentication only based on passwords can be inadequate due to different types of vulnerabilities and attacks. To solve this...
    Luis E. Almeida, Brayan A. Fernández, ... Sang Guun Yoo in Advanced Research in Technologies, Information, Innovation and Sustainability
    Conference paper 2024
  8. Learning Framework for Guessing Alphanumeric Passwords on Mobile Phones Based on User Context and Fragment Semantics

    When conducting a criminal investigation, accessing mobile phone data is crucial for law enforcement. However, encryption mechanisms and user locks...
    Lilian Noronha Nassif, Jonny Silva de Oliveira in Digital Forensics and Cyber Crime
    Conference paper 2024
  9. Cryptanalysis of Human Identification Protocol with Human-Computable Passwords

    In this paper we demonstrate effective attacks on Human Identification Protocol with Human-Computable Passwords (HIPHCP) presented in ISPEC’22. The...
    Maciej Grześkowiak, Łukasz Krzywiecki, Karol Niczyj in Information Security Practice and Experience
    Conference paper 2023
  10. Honey, I Chunked the Passwords: Generating Semantic Honeywords Resistant to Targeted Attacks Using Pre-trained Language Models

    Honeywords are fictitious passwords inserted into databases in order to identify password breaches. The major challenge is producing honeywords that...
    Conference paper 2023
  11. Memorability of Japanese Mnemonic Passwords

    Password authentication is the most commonly used mechanism for user authentication. However, its vulnerability to different attacks such as...
    Conference paper 2021
  12. Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked Passwords

    Passwords are still the most common authentication method for various digital services. The majority of the research into passwords is focused on...
    Daniel Mølmark-O’Connor, Emmanouil Vasilomanolakis in Computer Security – ESORICS 2022
    Conference paper 2022
  13. User Authentication—Passwords, Biometrics and Alternatives

    This chapter is on user authentication—humans being authenticated by a computer system. Chapter 4 addresses machine-to-machine authentication and...
    Paul C. van Oorschot in Computer Security and the Internet
    Chapter 2021
  14. Probing for Passwords – Privacy Implications of SSIDs in Probe Requests

    Probe requests help mobile devices discover active Wi-Fi networks. They often contain a multitude of data that can be used to identify and track...
    Johanna Ansohn McDougall, Christian Burkert, ... Hannes Federrath in Applied Cryptography and Network Security
    Conference paper 2022
  15. \(\textsf{PERKS}\) : Persistent and Distributed Key Acquisition for Secure Storage from Passwords

    We investigate how users of instant messaging (IM) services can acquire strong encryption keys to back up their messages and media with strong...
    Gareth T. Davies, Jeroen Pijnenburg in Selected Areas in Cryptography
    Conference paper 2024
  16. Signing In and Out and Managing Passwords

    In this chapter, I describe the Identity API features for signing in and out of applications. Identity supports different ways of signing in, and I...
    Adam Freeman in Pro ASP.NET Core Identity
    Chapter 2021
  17. Passwords

    We can’t go much further in this book without discussing passwords. I hate passwords. I hate them with a passion. And I know I’m not alone. But...
    Chapter 2020
  18. Secure Human Identification Protocol with Human-Computable Passwords

    In this paper we present a new method of secure human-computer identification, which remains safe also in untrusted systems and environments. This...
    Conference paper Open access 2022
  19. GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection

    Nowadays, the graphical password has gained significant recognition and has become a subject of extensive investigation within the research...

    Palash Ray, Debasis Giri, ... Soumyadeep Hore in Multimedia Tools and Applications
    Article 12 December 2023
  20. Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution

    Keyboard patterns are widely used in password construction, as they can be easily memorized with the aid of positions on the keyboard. Consequently,...
    Kunyu Yang, Xuexian Hu, ... Wenfen Liu in Information and Communications Security
    Conference paper 2021
Did you find what you were looking for? Share feedback.