Moving from a 'human-as-problem” to a 'human-as-solution” cybersecurity mindset
V Zimmermann, K Renaud - International Journal of Human-Computer …, 2019 - Elsevier
Cybersecurity has gained prominence, with a number of widely publicised security incidents,
hacking attacks and data breaches reaching the news over the last few years. The …
hacking attacks and data breaches reaching the news over the last few years. The …
GENPass: A multi-source deep learning model for password guessing
The password has become today's dominant method of authentication. While brute-force
attack methods such as HashCat and John the Ripper have proven unpractical, the research …
attack methods such as HashCat and John the Ripper have proven unpractical, the research …
" I don't see why I would ever want to use it" Analyzing the Usability of Popular Smartphone Password Managers
S Seiler-Hwang, P Arias-Cabarcos, A Marín… - Proceedings of the …, 2019 - dl.acm.org
Passwords are an often unavoidable authentication mechanism, despite the availability of
additional alternative means. In the case of smartphones, usability problems are aggravated …
additional alternative means. In the case of smartphones, usability problems are aggravated …
Strong password generation based on user inputs
FZ Glory, AU Aftab, O Tremblay-Savard… - 2019 IEEE 10th …, 2019 - ieeexplore.ieee.org
Every person using different online services is concerned with the security and privacy for
protecting individual information from the intruders. Many authentication systems are …
protecting individual information from the intruders. Many authentication systems are …
A Critical appraisal on Password based Authentication
AA Kaur, KK Mustafa - International Journal of Computer Network …, 2019 - mecs-press.org
There is no doubt that, even after the development of many other authentication schemes,
passwords remain one of the most popular means of authentication. A review in the field of …
passwords remain one of the most popular means of authentication. A review in the field of …
Why do not we use password managers? A study on the intention to use password managers
R Ayyagari, J Lim, O Hoxha - Contemporary Management Research, 2019 - cmr-journal.org
Why don't individuals follow the best information security practices? We address an aspect
of this question by focusing on one of the most common authentication methods–passwords …
of this question by focusing on one of the most common authentication methods–passwords …
Password guessing based on semantic analysis and neural networks
Y Fang, K Liu, F Jing, Z Zuo - … , CTCIS 2018, Wuhan, China, October 18 …, 2019 - Springer
Passwords remain the dominant method in data encryption and identity authentication, but
they are vulnerable to guessing attack. Most users incline to choose meaningful words to …
they are vulnerable to guessing attack. Most users incline to choose meaningful words to …
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization
X Yu, Q Liao - International Journal of Information Security, 2019 - Springer
While other authentication methods exist, passwords are still the dominant way for user
authentication and system security. Over the years, passwords have become long and …
authentication and system security. Over the years, passwords have become long and …
Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes
Many password alternatives for web authentication proposed over the years, despite having
different designs and objectives, all predominantly rely on the knowledge of some secret …
different designs and objectives, all predominantly rely on the knowledge of some secret …
An online password guessing method based on big data
Z Li, T Li, F Zhu - Proceedings of the 2019 3rd International Conference …, 2019 - dl.acm.org
Password authentication is the most widely used authentication method in information
systems. The traditional proactive password detection method is generally implemented by …
systems. The traditional proactive password detection method is generally implemented by …