Don't forget the stuffing! revisiting the security impact of typo-tolerant password authentication
To enhance the usability of password authentication, typo-tolerant password authentication
schemes permit certain deviations in the user-supplied password, to account for common …
schemes permit certain deviations in the user-supplied password, to account for common …
The typtop system: Personalized typo-tolerant password checking
R Chatterjee, J Woodage, Y Pnueli… - Proceedings of the …, 2017 - dl.acm.org
Password checking systems traditionally allow login only if the correct password is
submitted. Recent work on typo-tolerant password checking suggests that usability can be …
submitted. Recent work on typo-tolerant password checking suggests that usability can be …
End-to-end passwords
Passwords continue to be an important means for users to authenticate themselves to
applications, websites, and backend services. However, password theft continues to be a …
applications, websites, and backend services. However, password theft continues to be a …
General framework for evaluating password complexity and strength
Although it is common for users to select bad passwords that can be easily cracked by
attackers, password-based authentication remains the most widely-used method. To …
attackers, password-based authentication remains the most widely-used method. To …
pASSWORD tYPOS and how to correct them securely
R Chatterjee, A Athayle, D Akhawe… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We provide the first treatment of typo-tolerant password authentication for arbitrary user-
selected passwords. Such a system, rather than simply rejecting a login attempt with an …
selected passwords. Such a system, rather than simply rejecting a login attempt with an …
Practical recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blocklist requirements
Multiple mechanisms exist to encourage users to create stronger passwords, including
minimum-length and character-class requirements, prohibiting blocklisted passwords, and …
minimum-length and character-class requirements, prohibiting blocklisted passwords, and …
[图书][B] Measuring the usability and security of permuted passwords on mobile platforms
Password entry on mobile devices significantly impacts both usability and security, but there
is a lack of usable security research in this area, specifically for complex password entry. To …
is a lack of usable security research in this area, specifically for complex password entry. To …
Birthday, name and bifacial-security: understanding passwords of Chinese web users
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …
few studies have examined how non-English speaking users select passwords. In this …
Strengthening password-based authentication
Even with years of research into new authentication technologies, passwords still dominate
the authentication landscape. This is due primarily to a combination of security …
the authentication landscape. This is due primarily to a combination of security …
An empirical analysis on the usability and security of passwords
Security and usability are two essential aspects of a system, but they usually move in
opposite directions. Sometimes, to achieve security, usability has to be compromised, and …
opposite directions. Sometimes, to achieve security, usability has to be compromised, and …