Passwords and the evolution of imperfect authentication

J Bonneau, C Herley, PC Van Oorschot… - Communications of the …, 2015 - dl.acm.org
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …

A research agenda acknowledging the persistence of passwords

C Herley, P Van Oorschot - IEEE Security & privacy, 2011 - ieeexplore.ieee.org
Despite countless attempts and near-universal desire to replace them, passwords are more
widely used and firmly entrenched than ever. The authors' exploration leads them to argue …

On the implications of Zipf's law in passwords

D Wang, P Wang - European Symposium on Research in Computer …, 2016 - Springer
Textual passwords are perhaps the most prevalent mechanism for access control over the
Internet. Despite the fact that human-beings generally select passwords in a highly skewed …

An {Administrator's} Guide to Internet Password Research

D Florêncio, C Herley, PC Van Oorschot - 28th large installation system …, 2014 - usenix.org
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …

pASSWORD tYPOS and how to correct them securely

R Chatterjee, A Athayle, D Akhawe… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
We provide the first treatment of typo-tolerant password authentication for arbitrary user-
selected passwords. Such a system, rather than simply rejecting a login attempt with an …

Passwords: If we're so smart, why are we still using them?

C Herley, PC Van Oorschot, AS Patrick - Financial Cryptography and Data …, 2009 - Springer
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same–
such as the use of alphanumeric passwords. Passwords remain the dominant means of …

Designing password policies for strength and usability

R Shay, S Komanduri, AL Durity, P Huh… - ACM Transactions on …, 2016 - dl.acm.org
Password-composition policies are the result of service providers becoming increasingly
concerned about the security of online accounts. These policies restrict the space of user …

Practical recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blocklist requirements

J Tan, L Bauer, N Christin, LF Cranor - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Multiple mechanisms exist to encourage users to create stronger passwords, including
minimum-length and character-class requirements, prohibiting blocklisted passwords, and …

[PDF][PDF] Foiling the cracker: A survey of, and improvements to, password security

DV Klein - Proceedings of the 2nd USENIX Security Workshop, 1990 - homeworks.it
i safety should be tunable on a per-site basis, depending on the degree of security desired.
For example t should be possible to specify a minimum length password, a restriction that …

The benefits of understanding passwords

M Jakobsson, M Jakobsson, M Dhiman - Mobile Authentication: Problems …, 2013 - Springer
In an effort to assess the strength of passwords, password strength checkers count lower-
case and upper-case letters, digits and other characters. However, this does not truly …