Survey and systematization of secure device pairing
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …
communications among smart devices, both personal mobile devices and Internet of Things …
Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
In this paper, we present the first longitudinal measurement study of the underground
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …
Let's go in for a closer look: Observing passwords in their natural habitat
Text passwords---a frequent vector for account compromise, yet still ubiquitous---have been
studied for decades by researchers attempting to determine how to coerce users to create …
studied for decades by researchers attempting to determine how to coerce users to create …
An offensive and defensive exposition of wearable computing
P Shrestha, N Saxena - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Wearable computing is rapidly getting deployed in many—commercial, medical, and
personal—domains of day-to-day life. Wearable devices appear in various forms, shapes …
personal—domains of day-to-day life. Wearable devices appear in various forms, shapes …
Computer-implemented systems and methods of device based, internet-centric, authentication
BG Ross, BP Hollin, CJ Durkin, HD Anuszewski… - US Patent …, 2017 - Google Patents
Systems and computer-implemented methods for authoriz ing respective access by each of
a plurality of Internet users to a respective one or more Internet services provided by each of …
a plurality of Internet users to a respective one or more Internet services provided by each of …
System and method for biometric protocol standards
JF Mather, A Othman, S Streit, I Dumitran… - US Patent …, 2017 - Google Patents
Secure communications are provided between a user computing device and a server
computing device. An enrollment request is received from a user computing device that is …
computing device. An enrollment request is received from a user computing device that is …
Security keys: Practical cryptographic second factors for the modern web
Abstract “Security Keys” are second-factor devices that protect users against phishing and
man-in-the-middle attacks. Users carry a single device and can self-register it with any …
man-in-the-middle attacks. Users carry a single device and can self-register it with any …
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices
This paper presents D raw-A-PIN, a user authentication system on a device with a touch
interface that supports the use of PINs. In the proposed system, the user is asked to draw her …
interface that supports the use of PINs. In the proposed system, the user is asked to draw her …
Personal information in passwords and its security implications
While it is not recommended, Internet users tend to include personal information in their
passwords for easy memorization. However, the use of personal information in passwords …
passwords for easy memorization. However, the use of personal information in passwords …