Passwords and the evolution of imperfect authentication
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
[图书][B] Computer security: principles and practice
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …
programmers, system managers, network managers, product marketing personnel, system …
Monte Carlo strength evaluation: Fast and reliable password checking
M Dell'Amico, M Filippone - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Modern password guessing attacks adopt sophisticated probabilistic techniques that allow
for orders of magnitude less guesses to succeed compared to brute force. Unfortunately …
for orders of magnitude less guesses to succeed compared to brute force. Unfortunately …
On the Impact of Touch {ID} on {iPhone} Passcodes
I Cherapau, I Muslukhov, N Asanka… - Eleventh Symposium On …, 2015 - usenix.org
Smartphones today store large amounts of data that can be confidential, private or sensitive.
To protect such data, all mobile OSs have a phone lock mechanism, a mechanism that …
To protect such data, all mobile OSs have a phone lock mechanism, a mechanism that …
A large-scale evaluation of high-impact password strength meters
XDCD Carnavalet, M Mannan - ACM Transactions on Information and …, 2015 - dl.acm.org
Passwords are ubiquitous in our daily digital lives. They protect various types of assets
ranging from a simple account on an online newspaper website to our health information on …
ranging from a simple account on an online newspaper website to our health information on …
The emperor's new password creation policies: An evaluation of leading web services and the effect of role in resisting against online guessing
While much has changed in Internet security over the past decades, textual passwords
remain as the dominant method to secure user web accounts and they are proliferating in …
remain as the dominant method to secure user web accounts and they are proliferating in …
Quantifying the security advantage of password expiration policies
S Chiasson, PC Van Oorschot - Designs, Codes and Cryptography, 2015 - Springer
Many security policies force users to change passwords within fixed intervals, with the
apparent justification that this improves overall security. However, the implied security …
apparent justification that this improves overall security. However, the implied security …
Authentication method using multi-factor eye gaze
LA Herrera - US Patent App. 14/687,260, 2015 - Google Patents
BACKGROUND 0003 Advances in mobile computing and hardware plat forms have
enabled mobile devices to become extensions of their users. The category of mobile devices …
enabled mobile devices to become extensions of their users. The category of mobile devices …
On the Memorability of System-generated {PINs}: Can Chunking Help?
To ensure that users do not choose weak personal identication numbers (PINs), many banks
give out system-generated random PINs. 4-digit is the most commonly used PIN length, but …
give out system-generated random PINs. 4-digit is the most commonly used PIN length, but …
Choose your own authentication
To solve the long-standing problems users have in creating and remembering text
passwords, a wide variety of alternative authentication schemes have been proposed. Some …
passwords, a wide variety of alternative authentication schemes have been proposed. Some …