Passwords and the evolution of imperfect authentication

J Bonneau, C Herley, PC Van Oorschot… - Communications of the …, 2015 - dl.acm.org
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Monte Carlo strength evaluation: Fast and reliable password checking

M Dell'Amico, M Filippone - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Modern password guessing attacks adopt sophisticated probabilistic techniques that allow
for orders of magnitude less guesses to succeed compared to brute force. Unfortunately …

On the Impact of Touch {ID} on {iPhone} Passcodes

I Cherapau, I Muslukhov, N Asanka… - Eleventh Symposium On …, 2015 - usenix.org
Smartphones today store large amounts of data that can be confidential, private or sensitive.
To protect such data, all mobile OSs have a phone lock mechanism, a mechanism that …

A large-scale evaluation of high-impact password strength meters

XDCD Carnavalet, M Mannan - ACM Transactions on Information and …, 2015 - dl.acm.org
Passwords are ubiquitous in our daily digital lives. They protect various types of assets
ranging from a simple account on an online newspaper website to our health information on …

The emperor's new password creation policies: An evaluation of leading web services and the effect of role in resisting against online guessing

D Wang, P Wang - Computer Security--ESORICS 2015: 20th European …, 2015 - Springer
While much has changed in Internet security over the past decades, textual passwords
remain as the dominant method to secure user web accounts and they are proliferating in …

Quantifying the security advantage of password expiration policies

S Chiasson, PC Van Oorschot - Designs, Codes and Cryptography, 2015 - Springer
Many security policies force users to change passwords within fixed intervals, with the
apparent justification that this improves overall security. However, the implied security …

Authentication method using multi-factor eye gaze

LA Herrera - US Patent App. 14/687,260, 2015 - Google Patents
BACKGROUND 0003 Advances in mobile computing and hardware plat forms have
enabled mobile devices to become extensions of their users. The category of mobile devices …

On the Memorability of System-generated {PINs}: Can Chunking Help?

JH Huh, H Kim, RB Bobba, MN Bashir… - eleventh symposium on …, 2015 - usenix.org
To ensure that users do not choose weak personal identication numbers (PINs), many banks
give out system-generated random PINs. 4-digit is the most commonly used PIN length, but …

Choose your own authentication

A Forget, S Chiasson, R Biddle - Proceedings of the 2015 New Security …, 2015 - dl.acm.org
To solve the long-standing problems users have in creating and remembering text
passwords, a wide variety of alternative authentication schemes have been proposed. Some …