Leet usage and its effect on password security

W Li, J Zeng - IEEE Transactions on Information Forensics and …, 2021 - ieeexplore.ieee.org
… Over the past fifteen years, numerous surveys and studies suggest that password reusing
behavior is more prevalent than previously believed; users set the same or similar passwords

Evaluating the memorability of different password creation strategies: A systematic literature review

M Lennartsson - 2019 - diva-portal.org
passwords to be remembered is rising as well. This puts a noticeable strain on human memory
which users attempt to mitigate by writing them down, reusing … memorable passwords is …

Dynamically generate password policy via Zipf distribution

Y Xiao, J Zeng - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
… of leaked password datasets have happened frequently [2]–[6]. Since password reuse across
… More sadly, users often choose passwords that have predictable patterns such as personal …

Comparative analysis of three language spheres: Are linguistic and cultural differences reflected in password selection habits?

K Mori, T Watanabe, Y Zhou… - … on Information and …, 2020 - search.ieice.org
… Hunt, “Password reuse, credential stuffing and another billion records in have i been
pwned,” https://www.troyhunt.com/passwordreuse-credential-stuffing-and-another-1-billion-records-…

Alphapwd: A password generation strategy based on mnemonic shape

J Song, D Wang, Z Yun, X Han - IEEE Access, 2019 - ieeexplore.ieee.org
… of them as passwords, which provides the possibility for targeted password attacks and
password reuse attacks based on personal information [5], [6]. Password security and usability …

Pump up password security! Evaluating and enhancing risk-based authentication on a real-world large-scale online service

S Wiefling, PR Jørgensen, S Thunem… - ACM Transactions on …, 2022 - dl.acm.org
… Credential stuffing and password spraying attacks automatically enter leaked login credentials
(username and password) on other websites in the hope that users have reused them [16…

Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
… in a password is a stronger indicator for password vulnerability than … real-time password
strength meter to estimate the passwords’ … password reuse information [29] in password creation. …

A Critical appraisal on Password based Authentication

AA Kaur, KK Mustafa - International Journal of Computer Network …, 2019 - mecs-press.org
… They also intend to reuse the password across different web accounts by involving some
salts. Browser extensions such as PwdHash is an example of such types [33]. …

Understanding passwords–a taxonomy of password creation strategies

J Kävrestad, F Eriksson, M Nohlberg - Information & Computer …, 2019 - emerald.com
… of password security, including password reuse. However, this study is limited to the
strategies used by users to create passwords and not how passwords are handled in general. …

# segments: A dominant factor of password security to resist against data-driven guessing

C Wang, J Zhang, M Xu, H Zhang, W Han - Computers & Security, 2022 - Elsevier
… on four leaked real-world password datasets with over 110 million passwords in total. First,
… Segments, the password length, and the number of character classes, on password security. …