Passwords and the evolution of imperfect authentication
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
A research agenda acknowledging the persistence of passwords
C Herley, P Van Oorschot - IEEE Security & privacy, 2011 - ieeexplore.ieee.org
Despite countless attempts and near-universal desire to replace them, passwords are more
widely used and firmly entrenched than ever. The authors' exploration leads them to argue …
widely used and firmly entrenched than ever. The authors' exploration leads them to argue …
On the implications of Zipf's law in passwords
Textual passwords are perhaps the most prevalent mechanism for access control over the
Internet. Despite the fact that human-beings generally select passwords in a highly skewed …
Internet. Despite the fact that human-beings generally select passwords in a highly skewed …
An {Administrator's} Guide to Internet Password Research
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …
securing web-facing services or setting policies. With a view to improving this situation we …
pASSWORD tYPOS and how to correct them securely
R Chatterjee, A Athayle, D Akhawe… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We provide the first treatment of typo-tolerant password authentication for arbitrary user-
selected passwords. Such a system, rather than simply rejecting a login attempt with an …
selected passwords. Such a system, rather than simply rejecting a login attempt with an …
Passwords: If we're so smart, why are we still using them?
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same–
such as the use of alphanumeric passwords. Passwords remain the dominant means of …
such as the use of alphanumeric passwords. Passwords remain the dominant means of …
Designing password policies for strength and usability
R Shay, S Komanduri, AL Durity, P Huh… - ACM Transactions on …, 2016 - dl.acm.org
Password-composition policies are the result of service providers becoming increasingly
concerned about the security of online accounts. These policies restrict the space of user …
concerned about the security of online accounts. These policies restrict the space of user …
Practical recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blocklist requirements
Multiple mechanisms exist to encourage users to create stronger passwords, including
minimum-length and character-class requirements, prohibiting blocklisted passwords, and …
minimum-length and character-class requirements, prohibiting blocklisted passwords, and …
[PDF][PDF] Foiling the cracker: A survey of, and improvements to, password security
DV Klein - Proceedings of the 2nd USENIX Security Workshop, 1990 - homeworks.it
i safety should be tunable on a per-site basis, depending on the degree of security desired.
For example t should be possible to specify a minimum length password, a restriction that …
For example t should be possible to specify a minimum length password, a restriction that …
The benefits of understanding passwords
M Jakobsson, M Jakobsson, M Dhiman - Mobile Authentication: Problems …, 2013 - Springer
In an effort to assess the strength of passwords, password strength checkers count lower-
case and upper-case letters, digits and other characters. However, this does not truly …
case and upper-case letters, digits and other characters. However, this does not truly …