Password Expiration Strategy: A Perspective of Ecological Memory
Based on the ecological user memory, this paper establishes a security strategy model
(SSM) to quantify the memory cost of passwords and the value of accounts to users in …
(SSM) to quantify the memory cost of passwords and the value of accounts to users in …
Picture PassDoodle: usability study
D Schwab, L ALharbi, O Nichols… - 2018 IEEE Fourth …, 2018 - ieeexplore.ieee.org
Text password is the most widely used method for authentication. However, users have
difficulty recalling secure passwords. Therefore, users will choose shorter, less secure …
difficulty recalling secure passwords. Therefore, users will choose shorter, less secure …
An empirical analysis on the usability and security of passwords
Security and usability are two essential aspects of a system, but they usually move in
opposite directions. Sometimes, to achieve security, usability has to be compromised, and …
opposite directions. Sometimes, to achieve security, usability has to be compromised, and …
A password generator tool to increase users' awareness on bad password construction strategies
P Tsokkis, E Stavrou - 2018 International Symposium on …, 2018 - ieeexplore.ieee.org
Cybersecurity education and training activities are essential to empower end users to take
informed decisions and address cyber threats. An ongoing problem that still troubles the …
informed decisions and address cyber threats. An ongoing problem that still troubles the …
User behaviors and attitudes under password expiration policies
Policies that require employees to update their passwords regularly have become common
at universities and government organizations. However, prior work has suggested that …
at universities and government organizations. However, prior work has suggested that …
Finding the middle ground: measuring passwords for security and memorability
JJ Rodriguez, MF Zibran… - 2022 IEEE/ACIS 20th …, 2022 - ieeexplore.ieee.org
Passwords are a ubiquitous element of our digital age, and the need for secure passwords
is indispensable. However, traditionally secure passwords tends to be very difficult to …
is indispensable. However, traditionally secure passwords tends to be very difficult to …
How to end password reuse on the web
We present a framework by which websites can coordinate to make it difficult for users to set
similar passwords at these websites, in an effort to break the culture of password reuse on …
similar passwords at these websites, in an effort to break the culture of password reuse on …
The password life cycle
Managing passwords is a difficult task for users, who must create, remember, and keep track
of large numbers of passwords. In this work, we investigated users' coping strategies for …
of large numbers of passwords. In this work, we investigated users' coping strategies for …
A password strength evaluation algorithm based on sensitive personal information
X Cui, C Li, Y Qin, Y Ding - … on Trust, Security and Privacy in …, 2020 - ieeexplore.ieee.org
In this paper, a password strength evaluation method based on sensitive personal
information is presented. Firstly, the relationship between users' password construction and …
information is presented. Firstly, the relationship between users' password construction and …
The light side of passwords: turning motivation from the extrinsic to the intrinsic
N Woods - Pre-ICIS Workshop on Information Security and Privacy …, 2019 - jyx.jyu.fi
There are many good and bad aspects to password authentication. They are mostly without
cost, securing many accounts and systems, and allowing users access from anywhere in the …
cost, securing many accounts and systems, and allowing users access from anywhere in the …