[HTML][HTML] Recurrent gans password cracker for iot password security enhancement
S Nam, S Jeon, H Kim, J Moon - Sensors, 2020 - mdpi.com
Text-based passwords are a fundamental and popular means of authentication. Password
authentication can be simply implemented because it does not require any equipment …
authentication can be simply implemented because it does not require any equipment …
{Pass2Edit}: A {Multi-Step} Generative Model for Guessing Edited Passwords
While password stuffing attacks (that exploit the direct password reuse behavior) have
gained considerable attention, only a few studies have examined password tweaking …
gained considerable attention, only a few studies have examined password tweaking …
An empirical study of mnemonic sentence-based password generation strategies
Mnemonic strategy has been recommended to help users generate secure and memorable
passwords. We evaluated the security of 6 mnemonic strategy variants in a series of online …
passwords. We evaluated the security of 6 mnemonic strategy variants in a series of online …
Memento: How to reconstruct your secrets from a single password in a hostile environment
Passwords are inherently vulnerable to dictionary attacks, but are quite secure if guessing
attempts can be slowed down, for example by an online server. If this server gets …
attempts can be slowed down, for example by an online server. If this server gets …
A new multimodal approach for password strength estimation—Part I: Theory and algorithms
J Galbally, I Coisel, I Sanchez - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
After more than two decades of research in the field of password strength estimation, one
clear conclusion may be drawn: no password strength metric by itself is better than all other …
clear conclusion may be drawn: no password strength metric by itself is better than all other …
" As soon as it's a risk, I want to require {MFA"}: How Administrators Configure Risk-based Authentication
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …
knowledge about previously observed user behavior to prevent malicious login attempts …
Veriui: Attested login for mobile devices
Mobile apps increasingly require users to login to remote services such as Facebook and
Twitter. Unfortunately, today's mobile platforms provide weak protection for login credentials …
Twitter. Unfortunately, today's mobile platforms provide weak protection for login credentials …
[HTML][HTML] Hands-free multi-type character text entry in virtual reality
Multi-type characters, including uppercase and lowercase letters, symbols, and numbers,
are essential in text entry activities. Although multi-type characters are used in passwords …
are essential in text entry activities. Although multi-type characters are used in passwords …
Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …
Can Password Meter be More Effective Towards User Attention, Engagement, and Attachment?: A Study of Metaphor-based Designs
Password meter offers feedback on users' password strength, with a goal of protecting
against security breaches. In this study, we aimed at understanding the potential of …
against security breaches. In this study, we aimed at understanding the potential of …