The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …

[PDF][PDF] A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem

AA Süzen - International Journal of Computer Network and …, 2020 - researchgate.net
The development of technology and uses increases the interconnected digital ecosystem.
This is accompanied by dense data usage. Wherever digital data is available, cyber-attacks …

Revisiting security vulnerabilities in commercial password managers

M Carr, SF Shahandashti - ICT Systems Security and Privacy Protection …, 2020 - Springer
In this work we analyse five popular commercial password managers for security
vulnerabilities. Our analysis is twofold. First, we compile a list of previously disclosed …

[HTML][HTML] Recurrent gans password cracker for iot password security enhancement

S Nam, S Jeon, H Kim, J Moon - Sensors, 2020 - mdpi.com
Text-based passwords are a fundamental and popular means of authentication. Password
authentication can be simply implemented because it does not require any equipment …

[HTML][HTML] An efficient two-factor authentication scheme based on the Merkle tree

X Yin, J He, Y Guo, D Han, KC Li, A Castiglione - Sensors, 2020 - mdpi.com
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor
authentication. In this algorithm, a shared secret is used to derive a One-Time Password …

UIPA: User authentication method based on user interface preferences for account recovery process

NA Karim, Z Shukur, AEM AL-banna - Journal of Information Security and …, 2020 - Elsevier
Because of the global increment of various computer implementation, the usage of the
internet has increased significantly. This phenomenon has mainly contributed to the growing …

Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites

Y He, EE Alem, W Wang - Frontiers of Computer Science, 2020 - Springer
Password authentication is vulnerable to dictionary attacks. Password strength
measurement helps users to choose hard-to-guess passwords and enhance the security of …

Password Management: How Secure Is Your Login Process?

G Hatzivasilis - International workshop on model-driven simulation and …, 2020 - Springer
Pairs of usernames and passwords are widely used nowadays by mobile and web
applications to identify users. The exposure of this data harms both users and vendors. The …

Bypass: Reconsidering the usability of password managers

E Stobert, T Safaie, H Molyneaux, M Mannan… - Security and Privacy in …, 2020 - Springer
Since passwords are an unavoidable mechanism for authenticating to online services,
experts often recommend using a password manager for better password security. However …

[PDF][PDF] Introducing a machine learning password metric based on EFKM clustering algorithm

OS Almousa, H Migdady - International Journal of Communication …, 2020 - academia.edu
Enhanced Fuzzy K-Means clustering algorithm (EFKM henceforth). We train the EFKM on
the OWASP list of 10002 weak passwords. After that, we maximize the optimized centroids to …