Survey and systematization of secure device pairing

M Fomichev, F Alvarez, D Steinmetzer… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

Data breaches, phishing, or malware? Understanding the risks of stolen credentials

K Thomas, F Li, A Zand, J Barrett, J Ranieri… - Proceedings of the …, 2017 - dl.acm.org
In this paper, we present the first longitudinal measurement study of the underground
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …

Let's go in for a closer look: Observing passwords in their natural habitat

S Pearman, J Thomas, PE Naeini, H Habib… - Proceedings of the …, 2017 - dl.acm.org
Text passwords---a frequent vector for account compromise, yet still ubiquitous---have been
studied for decades by researchers attempting to determine how to coerce users to create …

An offensive and defensive exposition of wearable computing

P Shrestha, N Saxena - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Wearable computing is rapidly getting deployed in many—commercial, medical, and
personal—domains of day-to-day life. Wearable devices appear in various forms, shapes …

Computer-implemented systems and methods of device based, internet-centric, authentication

BG Ross, BP Hollin, CJ Durkin, HD Anuszewski… - US Patent …, 2017 - Google Patents
Systems and computer-implemented methods for authoriz ing respective access by each of
a plurality of Internet users to a respective one or more Internet services provided by each of …

System and method for biometric protocol standards

JF Mather, A Othman, S Streit, I Dumitran… - US Patent …, 2017 - Google Patents
Secure communications are provided between a user computing device and a server
computing device. An enrollment request is received from a user computing device that is …

Security keys: Practical cryptographic second factors for the modern web

J Lang, A Czeskis, D Balfanz, M Schilder… - … Cryptography and Data …, 2017 - Springer
Abstract “Security Keys” are second-factor devices that protect users against phishing and
man-in-the-middle attacks. Users carry a single device and can self-register it with any …

DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices

T Van Nguyen, N Sae-Bae, N Memon - computers & security, 2017 - Elsevier
This paper presents D raw-A-PIN, a user authentication system on a device with a touch
interface that supports the use of PINs. In the proposed system, the user is asked to draw her …

Personal information in passwords and its security implications

Y Li, H Wang, K Sun - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
While it is not recommended, Internet users tend to include personal information in their
passwords for easy memorization. However, the use of personal information in passwords …