Search
Search Results
-
Growing Up with Passwords
Children’s development progresses through developmental stages, but there is little understanding about how these stages impact children’s... -
Zipf’s law analysis on the leaked Iranian users’ passwords
Textual passwords are one of the most common methods of authentication and an important factor in systems security. Knowing the correct distribution...
-
Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children’s Password Practices
Though much is known about how adults understand and use passwords, little research attention has been paid specifically to parents or, more... -
Survey of Services that Store Passwords in a Recoverable Manner
Passwords entered by users in web services and applications are essential and confidential information. Therefore, it is ideal for difficulty storing... -
Towards Evaluating the Security of Human Computable Passwords Using Neural Networks
Passwords are playing a major role for authentication in our daily life. However contemporary passwords are typically either difficult to remember or... -
Hashing and Salting of Passwords
In this chapter we’re going to look at how you should go about securely storing passwords in your database. In most cases these will be passwords... -
One-Time Passwords: A Literary Review of Different Protocols and Their Applications
Currently, user authentication only based on passwords can be inadequate due to different types of vulnerabilities and attacks. To solve this... -
Learning Framework for Guessing Alphanumeric Passwords on Mobile Phones Based on User Context and Fragment Semantics
When conducting a criminal investigation, accessing mobile phone data is crucial for law enforcement. However, encryption mechanisms and user locks... -
Cryptanalysis of Human Identification Protocol with Human-Computable Passwords
In this paper we demonstrate effective attacks on Human Identification Protocol with Human-Computable Passwords (HIPHCP) presented in ISPEC’22. The... -
Honey, I Chunked the Passwords: Generating Semantic Honeywords Resistant to Targeted Attacks Using Pre-trained Language Models
Honeywords are fictitious passwords inserted into databases in order to identify password breaches. The major challenge is producing honeywords that... -
Memorability of Japanese Mnemonic Passwords
Password authentication is the most commonly used mechanism for user authentication. However, its vulnerability to different attacks such as... -
Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked Passwords
Passwords are still the most common authentication method for various digital services. The majority of the research into passwords is focused on... -
User Authentication—Passwords, Biometrics and Alternatives
This chapter is on user authentication—humans being authenticated by a computer system. Chapter 4 addresses machine-to-machine authentication and... -
Probing for Passwords – Privacy Implications of SSIDs in Probe Requests
Probe requests help mobile devices discover active Wi-Fi networks. They often contain a multitude of data that can be used to identify and track... -
\(\textsf{PERKS}\) : Persistent and Distributed Key Acquisition for Secure Storage from Passwords
We investigate how users of instant messaging (IM) services can acquire strong encryption keys to back up their messages and media with strong... -
Signing In and Out and Managing Passwords
In this chapter, I describe the Identity API features for signing in and out of applications. Identity supports different ways of signing in, and I... -
Passwords
We can’t go much further in this book without discussing passwords. I hate passwords. I hate them with a passion. And I know I’m not alone. But... -
Secure Human Identification Protocol with Human-Computable Passwords
In this paper we present a new method of secure human-computer identification, which remains safe also in untrusted systems and environments. This... -
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection
Nowadays, the graphical password has gained significant recognition and has become a subject of extensive investigation within the research...
-
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution
Keyboard patterns are widely used in password construction, as they can be easily memorized with the aid of positions on the keyboard. Consequently,...