On password behaviours and attitudes in different populations

R Alomari, J Thorpe - Journal of information security and applications, 2019 - Elsevier
Password Reuse. We asked participants whether they sometimes reuse the same password
in different applications, 100% of the Students group, 82% of the General group, and 77% of …

Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites

AS Albesher - Sustainability, 2023 - mdpi.com
… for different password policies to avoid password reuse. They indicated that websites should
have different password policies to force users to create different passwords for different …

Investigating the Password Policy Practices of Website Administrators

S Sahin, S Al Roomi, T Poteat… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
… in a report somewhere that we have a password history of four, and the requirements are to
have a password history of five. So security shared that with our director, and our director told …

[PDF][PDF] Might I Get Pwned: A second generation password breach alerting service

B Pal, M Islam, M Sanusi, N Sullivan, L Valenta… - USENIX …, 2022 - par.nsf.gov
… To prevent users from reusing their password across web services, … password in multiple
participating web services. The efficacy of this protocol relies on the coordination of the web

[PDF][PDF] Total Recall: Persistence of Passwords in Android.

J Lee, A Chen, DS Wallach - NDSS, 2019 - cs.uwaterloo.ca
… Users interact with the password manager via a “master” password, and the app then …
Such apps can also help users generate random passwords to mitigate password reuse [16]. As …

That was then, this is now: A security evaluation of password generation, storage, and autofill in thirteen password managers

S Oesch, S Ruoti - arXiv preprint arXiv:1908.03296, 2019 - arxiv.org
… and address many of the concerns surrounding password-based … password managers;
especially in browser-based password … likely to reuse password than users of app-based or …

Constructing secure and memorable passwords

J Kävrestad, M Lennartsson, M Birath… - Information & Computer …, 2020 - emerald.com
… It should be mentioned that password security is a complex … is password reuse and on this
topic, it should not go unmentioned that reusing the same password means that the password

No single silver bullet: Measuring the accuracy of password strength meters

D Wang, X Shan, Q Dong, Y Shen, C Jia - 32nd USENIX Security …, 2023 - usenix.org
… Though both fuzzyPSM [17] and PCFG-PSM [25] are based on the PCFG algorithm [36],
fuzzyPSM [17] captures real users’ password reuse behaviors and common modification …

Beyond credential stuffing: Password similarity models using neural networks

B Pal, T Daniel, R Chatterjee… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
website password policies, for simplicity, we will ignore the effect of password policy for now
and consider all passwords … Wang, “The tangled web of password reuse.” in NDSS, vol. 14, …

Systematic Solutions to Login and Authentication Security: A Dual-Password Login-Authentication Mechanism

Y Su, M Xi - arXiv preprint arXiv:2404.01803, 2024 - arxiv.org
password reuse are resolved; local storage of authentication passwords is no longer necessary.
… In this work, a user-selected password is converted into a complex password to create a …