On password behaviours and attitudes in different populations
… Password Reuse. We asked participants whether they sometimes reuse the same password
in different applications, 100% of the Students group, 82% of the General group, and 77% of …
in different applications, 100% of the Students group, 82% of the General group, and 77% of …
Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites
AS Albesher - Sustainability, 2023 - mdpi.com
… for different password policies to avoid password reuse. They indicated that websites should
have different password policies to force users to create different passwords for different …
have different password policies to force users to create different passwords for different …
Investigating the Password Policy Practices of Website Administrators
S Sahin, S Al Roomi, T Poteat… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
… in a report somewhere that we have a password history of four, and the requirements are to
have a password history of five. So security shared that with our director, and our director told …
have a password history of five. So security shared that with our director, and our director told …
[PDF][PDF] Might I Get Pwned: A second generation password breach alerting service
… To prevent users from reusing their password across web services, … password in multiple
participating web services. The efficacy of this protocol relies on the coordination of the web …
participating web services. The efficacy of this protocol relies on the coordination of the web …
[PDF][PDF] Total Recall: Persistence of Passwords in Android.
J Lee, A Chen, DS Wallach - NDSS, 2019 - cs.uwaterloo.ca
… Users interact with the password manager via a “master” password, and the app then …
Such apps can also help users generate random passwords to mitigate password reuse [16]. As …
Such apps can also help users generate random passwords to mitigate password reuse [16]. As …
That was then, this is now: A security evaluation of password generation, storage, and autofill in thirteen password managers
… and address many of the concerns surrounding password-based … password managers;
especially in browser-based password … likely to reuse password than users of app-based or …
especially in browser-based password … likely to reuse password than users of app-based or …
Constructing secure and memorable passwords
J Kävrestad, M Lennartsson, M Birath… - Information & Computer …, 2020 - emerald.com
… It should be mentioned that password security is a complex … is password reuse and on this
topic, it should not go unmentioned that reusing the same password means that the password …
topic, it should not go unmentioned that reusing the same password means that the password …
No single silver bullet: Measuring the accuracy of password strength meters
… Though both fuzzyPSM [17] and PCFG-PSM [25] are based on the PCFG algorithm [36],
fuzzyPSM [17] captures real users’ password reuse behaviors and common modification …
fuzzyPSM [17] captures real users’ password reuse behaviors and common modification …
Beyond credential stuffing: Password similarity models using neural networks
… website password policies, for simplicity, we will ignore the effect of password policy for now
and consider all passwords … Wang, “The tangled web of password reuse.” in NDSS, vol. 14, …
and consider all passwords … Wang, “The tangled web of password reuse.” in NDSS, vol. 14, …
Systematic Solutions to Login and Authentication Security: A Dual-Password Login-Authentication Mechanism
Y Su, M Xi - arXiv preprint arXiv:2404.01803, 2024 - arxiv.org
… password reuse are resolved; local storage of authentication passwords is no longer necessary.
… In this work, a user-selected password is converted into a complex password to create a …
… In this work, a user-selected password is converted into a complex password to create a …