Moving from a 'human-as-problem” to a 'human-as-solution” cybersecurity mindset

V Zimmermann, K Renaud - International Journal of Human-Computer …, 2019 - Elsevier
Cybersecurity has gained prominence, with a number of widely publicised security incidents,
hacking attacks and data breaches reaching the news over the last few years. The …

GENPass: A multi-source deep learning model for password guessing

Z Xia, P Yi, Y Liu, B Jiang, W Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The password has become today's dominant method of authentication. While brute-force
attack methods such as HashCat and John the Ripper have proven unpractical, the research …

" I don't see why I would ever want to use it" Analyzing the Usability of Popular Smartphone Password Managers

S Seiler-Hwang, P Arias-Cabarcos, A Marín… - Proceedings of the …, 2019 - dl.acm.org
Passwords are an often unavoidable authentication mechanism, despite the availability of
additional alternative means. In the case of smartphones, usability problems are aggravated …

Strong password generation based on user inputs

FZ Glory, AU Aftab, O Tremblay-Savard… - 2019 IEEE 10th …, 2019 - ieeexplore.ieee.org
Every person using different online services is concerned with the security and privacy for
protecting individual information from the intruders. Many authentication systems are …

A Critical appraisal on Password based Authentication

AA Kaur, KK Mustafa - International Journal of Computer Network …, 2019 - mecs-press.org
There is no doubt that, even after the development of many other authentication schemes,
passwords remain one of the most popular means of authentication. A review in the field of …

Why do not we use password managers? A study on the intention to use password managers

R Ayyagari, J Lim, O Hoxha - Contemporary Management Research, 2019 - cmr-journal.org
Why don't individuals follow the best information security practices? We address an aspect
of this question by focusing on one of the most common authentication methods–passwords …

Password guessing based on semantic analysis and neural networks

Y Fang, K Liu, F Jing, Z Zuo - … , CTCIS 2018, Wuhan, China, October 18 …, 2019 - Springer
Passwords remain the dominant method in data encryption and identity authentication, but
they are vulnerable to guessing attack. Most users incline to choose meaningful words to …

Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization

X Yu, Q Liao - International Journal of Information Security, 2019 - Springer
While other authentication methods exist, passwords are still the dominant way for user
authentication and system security. Over the years, passwords have become long and …

Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes

F Alaca, AR Abdou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Many password alternatives for web authentication proposed over the years, despite having
different designs and objectives, all predominantly rely on the knowledge of some secret …

An online password guessing method based on big data

Z Li, T Li, F Zhu - Proceedings of the 2019 3rd International Conference …, 2019 - dl.acm.org
Password authentication is the most widely used authentication method in information
systems. The traditional proactive password detection method is generally implemented by …