Forgotten passwords and Long-Gone exes: the life and death of Renren
L Jia - Internet Histories, 2022 - Taylor & Francis
… This paper reconstructs the history of Renren and documents its failed transformation
from a social network to a platform. Grounded in platform studies and a political economy …
from a social network to a platform. Grounded in platform studies and a political economy …
Improving password memorability, while not inconveniencing the user
… increased password numbers, there has been an increase in insecure password behaviors
(eg, password reuse)… Therefore, new and innovative ways are needed to increase password …
(eg, password reuse)… Therefore, new and innovative ways are needed to increase password …
Optiwords: A new password policy for creating memorable and strong passwords
Y Guo, Z Zhang, Y Guo - Computers & Security, 2019 - Elsevier
… online accounts, some users reuse passwords or employ simple strategies to transform a
basic … use the leaked website passwords as a training set to guess the Optiwords8 passwords. …
basic … use the leaked website passwords as a training set to guess the Optiwords8 passwords. …
[HTML][HTML] How memory anxiety can influence password security behavior
… to the password context and examined users’ password reuse and … We argue that users
engage in password reuse and … previous password research, focusing on password reuse and …
engage in password reuse and … previous password research, focusing on password reuse and …
Reasoning analytically about password-cracking software
… password-cracking algorithms as metrics of password strength. We then discuss probabilistic
models of passwords … -based password-cracking software. Our work focuses on trawling …
models of passwords … -based password-cracking software. Our work focuses on trawling …
[PDF][PDF] The Ginger: Another Spice to Hinder Attacks on Password Files.
… makes unlikable password files stolen from different servers even in case of password reuse.
Observe that, despite the use of salted hashes, an attacker, able to steal the password file …
Observe that, despite the use of salted hashes, an attacker, able to steal the password file …
Web Based Password Management System For Robust Applications
G Chandel, AS John, A Sharma - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
… Borisov, XW- NDSS, and undefined 2014, “The tangled web of password reuse.,” cs.umd.eduA
Das, J Bonneau, M Caesar, N Borisov, XF WangNDSS, 2014•cs.umd.edu, 2014, …
Das, J Bonneau, M Caesar, N Borisov, XF WangNDSS, 2014•cs.umd.edu, 2014, …
A Study of Password Security Factors among Bangladeshi Government Websites
AA Chowdhury, F Chowdhury… - 2020 23rd International …, 2020 - ieeexplore.ieee.org
… passwords, their security mechanisms, possible attack methods and weaknesses as well as
the password reuse … Wang, “The tangled web of password reuse.” in NDSS, vol. 14, no. 2014…
the password reuse … Wang, “The tangled web of password reuse.” in NDSS, vol. 14, no. 2014…
A usability study of fido2 roaming software tokens as a password replacement
B Rasmussen - 2021 - search.proquest.com
… Password reuse by itself is not detrimental to overall account security, but because of … ,
password reuse is highly discouraged. The combination of data breaches and password reuse …
password reuse is highly discouraged. The combination of data breaches and password reuse …
[PDF][PDF] evaluating password behavior at a small university
… passwords, consequently these passwords are easier to guess [1]. On top of that, people tend
to reuse the same password … As we mentioned earlier, reusing passwords across multiple …
to reuse the same password … As we mentioned earlier, reusing passwords across multiple …