Password Expiration Strategy: A Perspective of Ecological Memory

Y Zhao, W Li, Z Zhang, P Wang - 2019 IEEE Fifth International …, 2019 - ieeexplore.ieee.org
Based on the ecological user memory, this paper establishes a security strategy model
(SSM) to quantify the memory cost of passwords and the value of accounts to users in …

Picture PassDoodle: usability study

D Schwab, L ALharbi, O Nichols… - 2018 IEEE Fourth …, 2018 - ieeexplore.ieee.org
Text password is the most widely used method for authentication. However, users have
difficulty recalling secure passwords. Therefore, users will choose shorter, less secure …

An empirical analysis on the usability and security of passwords

KS Walia, S Shenoy, Y Cheng - 2020 IEEE 21st International …, 2020 - ieeexplore.ieee.org
Security and usability are two essential aspects of a system, but they usually move in
opposite directions. Sometimes, to achieve security, usability has to be compromised, and …

A password generator tool to increase users' awareness on bad password construction strategies

P Tsokkis, E Stavrou - 2018 International Symposium on …, 2018 - ieeexplore.ieee.org
Cybersecurity education and training activities are essential to empower end users to take
informed decisions and address cyber threats. An ongoing problem that still troubles the …

User behaviors and attitudes under password expiration policies

H Habib, PE Naeini, S Devlin, M Oates… - … Symposium on Usable …, 2018 - usenix.org
Policies that require employees to update their passwords regularly have become common
at universities and government organizations. However, prior work has suggested that …

Finding the middle ground: measuring passwords for security and memorability

JJ Rodriguez, MF Zibran… - 2022 IEEE/ACIS 20th …, 2022 - ieeexplore.ieee.org
Passwords are a ubiquitous element of our digital age, and the need for secure passwords
is indispensable. However, traditionally secure passwords tends to be very difficult to …

How to end password reuse on the web

KC Wang, MK Reiter - arXiv preprint arXiv:1805.00566, 2018 - arxiv.org
We present a framework by which websites can coordinate to make it difficult for users to set
similar passwords at these websites, in an effort to break the culture of password reuse on …

The password life cycle

E Stobert, R Biddle - ACM Transactions on Privacy and Security (TOPS), 2018 - dl.acm.org
Managing passwords is a difficult task for users, who must create, remember, and keep track
of large numbers of passwords. In this work, we investigated users' coping strategies for …

A password strength evaluation algorithm based on sensitive personal information

X Cui, C Li, Y Qin, Y Ding - … on Trust, Security and Privacy in …, 2020 - ieeexplore.ieee.org
In this paper, a password strength evaluation method based on sensitive personal
information is presented. Firstly, the relationship between users' password construction and …

The light side of passwords: turning motivation from the extrinsic to the intrinsic

N Woods - Pre-ICIS Workshop on Information Security and Privacy …, 2019 - jyx.jyu.fi
There are many good and bad aspects to password authentication. They are mostly without
cost, securing many accounts and systems, and allowing users access from anywhere in the …