[HTML][HTML] Recurrent gans password cracker for iot password security enhancement

S Nam, S Jeon, H Kim, J Moon - Sensors, 2020 - mdpi.com
Text-based passwords are a fundamental and popular means of authentication. Password
authentication can be simply implemented because it does not require any equipment …

{Pass2Edit}: A {Multi-Step} Generative Model for Guessing Edited Passwords

D Wang, Y Zou, YA Xiao, S Ma, X Chen - 32nd USENIX Security …, 2023 - usenix.org
While password stuffing attacks (that exploit the direct password reuse behavior) have
gained considerable attention, only a few studies have examined password tweaking …

An empirical study of mnemonic sentence-based password generation strategies

W Yang, N Li, O Chowdhury, A Xiong… - Proceedings of the 2016 …, 2016 - dl.acm.org
Mnemonic strategy has been recommended to help users generate secure and memorable
passwords. We evaluated the security of 6 mnemonic strategy variants in a series of online …

Memento: How to reconstruct your secrets from a single password in a hostile environment

J Camenisch, A Lehmann, A Lysyanskaya… - Advances in Cryptology …, 2014 - Springer
Passwords are inherently vulnerable to dictionary attacks, but are quite secure if guessing
attempts can be slowed down, for example by an online server. If this server gets …

A new multimodal approach for password strength estimation—Part I: Theory and algorithms

J Galbally, I Coisel, I Sanchez - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
After more than two decades of research in the field of password strength estimation, one
clear conclusion may be drawn: no password strength metric by itself is better than all other …

" As soon as it's a risk, I want to require {MFA"}: How Administrators Configure Risk-based Authentication

P Markert, T Schnitzler, M Golla… - Eighteenth Symposium on …, 2022 - usenix.org
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …

Veriui: Attested login for mobile devices

D Liu, LP Cox - Proceedings of the 15th workshop on mobile …, 2014 - dl.acm.org
Mobile apps increasingly require users to login to remote services such as Facebook and
Twitter. Unfortunately, today's mobile platforms provide weak protection for login credentials …

[HTML][HTML] Hands-free multi-type character text entry in virtual reality

T Wan, R Shi, W Xu, Y Li, K Atkinson, L Yu, HN Liang - Virtual Reality, 2024 - Springer
Multi-type characters, including uppercase and lowercase letters, symbols, and numbers,
are essential in text entry activities. Although multi-type characters are used in passwords …

Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations

A Constantinides, M Belk, C Fidas, R Beumers… - ACM Transactions on …, 2023 - dl.acm.org
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …

Can Password Meter be More Effective Towards User Attention, Engagement, and Attachment?: A Study of Metaphor-based Designs

A Behfar, H Atashpanjeh, MN Al-Ameen - Companion Publication of the …, 2023 - dl.acm.org
Password meter offers feedback on users' password strength, with a goal of protecting
against security breaches. In this study, we aimed at understanding the potential of …