[PDF][PDF] The impact of exposed passwords on honeyword efficacy
… Our findings that password reuse across sites is so detrimental to honeyword false-negative
rates (Sec. 4.3.2) provides yet more evidence that moving more users toward …
rates (Sec. 4.3.2) provides yet more evidence that moving more users toward …
Inside out-A study of users' perceptions of password memorability and recall
… tend to reuse passwords to cope … passwords we (1) had an adequate number of passwords
of each strength (ie, any shorter password length would have resulted very few passwords …
of each strength (ie, any shorter password length would have resulted very few passwords …
Improving password guessing via representation learning
… approach for password guessing. We show that an abstract password representation naturally
… , and yet presently active, password guessing field. These properties can establish novel …
… , and yet presently active, password guessing field. These properties can establish novel …
Costs and benefits of authentication advice
… We found 5 pieces of advice telling organisations to Store password history to eliminate
reuse, 1 encouraged organisations to Enforce a minimum password age, and 10 were in favour …
reuse, 1 encouraged organisations to Enforce a minimum password age, and 10 were in favour …
Fixing the fixes: Assessing the solutions of SAST tools for securing password storage
H Tupsamudre, M Sahu, K Vidhani, S Lodha - Financial Cryptography and …, 2020 - Springer
… to investigate the password creation and password management strategies (storage, reuse
etc.) of … For instance, users choose predictable passwords and reuse their passwords across …
etc.) of … For instance, users choose predictable passwords and reuse their passwords across …
Towards quantum large-scale password guessing on real-world distributions
… In the following section, we provide a brief introduction to password guessing and the real-world
password datasets we are using. Moreover, we describe how human password choice …
password datasets we are using. Moreover, we describe how human password choice …
Recurrent neural network based password generation for group attribute context-ware applications
J Luo, J Deng, C Lu, H Liu - 2019 IEEE 21st International …, 2019 - ieeexplore.ieee.org
… the habits of reusing the same password in the many websites [9], [10], and the user’s
password may … Wang, “The tangled web of password reuse.” in NDSS, vol. 14, 2014, pp. 23–26. …
password may … Wang, “The tangled web of password reuse.” in NDSS, vol. 14, 2014, pp. 23–26. …
Politics of data reuse in machine learning systems: Theorizing reuse entanglements
… reuse of data as an inherently entangled phenomenon. To examine this tension between the
discursive regimes and the realities of data reuse, we advance the notion of reuse … of reuse …
discursive regimes and the realities of data reuse, we advance the notion of reuse … of reuse …
Superword: A honeyword system for achieving higher security goals
Y Guo, Z Zhang, Y Guo - Computers & Security, 2021 - Elsevier
… password”? (2) How to prevent the intersection attack in multiple systems caused … password
reuse without reducing usability? (3) How to reduce the success rate of targeted password …
reuse without reducing usability? (3) How to reduce the success rate of targeted password …
MementoKey: Keeping passwords in mind
B Jeong, A Vallat, C Csikszentmihalyi, J Park… - Extended Abstracts of …, 2019 - dl.acm.org
… Some studies analyze real passwords through leaked … password and password reuse [6].
All this work has highlighted a number of issues, which are well known: secure passwords are …
All this work has highlighted a number of issues, which are well known: secure passwords are …