The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
[PDF][PDF] A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem
AA Süzen - International Journal of Computer Network and …, 2020 - researchgate.net
The development of technology and uses increases the interconnected digital ecosystem.
This is accompanied by dense data usage. Wherever digital data is available, cyber-attacks …
This is accompanied by dense data usage. Wherever digital data is available, cyber-attacks …
Revisiting security vulnerabilities in commercial password managers
M Carr, SF Shahandashti - ICT Systems Security and Privacy Protection …, 2020 - Springer
In this work we analyse five popular commercial password managers for security
vulnerabilities. Our analysis is twofold. First, we compile a list of previously disclosed …
vulnerabilities. Our analysis is twofold. First, we compile a list of previously disclosed …
[HTML][HTML] Recurrent gans password cracker for iot password security enhancement
S Nam, S Jeon, H Kim, J Moon - Sensors, 2020 - mdpi.com
Text-based passwords are a fundamental and popular means of authentication. Password
authentication can be simply implemented because it does not require any equipment …
authentication can be simply implemented because it does not require any equipment …
[HTML][HTML] An efficient two-factor authentication scheme based on the Merkle tree
X Yin, J He, Y Guo, D Han, KC Li, A Castiglione - Sensors, 2020 - mdpi.com
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor
authentication. In this algorithm, a shared secret is used to derive a One-Time Password …
authentication. In this algorithm, a shared secret is used to derive a One-Time Password …
UIPA: User authentication method based on user interface preferences for account recovery process
Because of the global increment of various computer implementation, the usage of the
internet has increased significantly. This phenomenon has mainly contributed to the growing …
internet has increased significantly. This phenomenon has mainly contributed to the growing …
Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites
Password authentication is vulnerable to dictionary attacks. Password strength
measurement helps users to choose hard-to-guess passwords and enhance the security of …
measurement helps users to choose hard-to-guess passwords and enhance the security of …
Password Management: How Secure Is Your Login Process?
G Hatzivasilis - International workshop on model-driven simulation and …, 2020 - Springer
Pairs of usernames and passwords are widely used nowadays by mobile and web
applications to identify users. The exposure of this data harms both users and vendors. The …
applications to identify users. The exposure of this data harms both users and vendors. The …
Bypass: Reconsidering the usability of password managers
Since passwords are an unavoidable mechanism for authenticating to online services,
experts often recommend using a password manager for better password security. However …
experts often recommend using a password manager for better password security. However …
[PDF][PDF] Introducing a machine learning password metric based on EFKM clustering algorithm
OS Almousa, H Migdady - International Journal of Communication …, 2020 - academia.edu
Enhanced Fuzzy K-Means clustering algorithm (EFKM henceforth). We train the EFKM on
the OWASP list of 10002 weak passwords. After that, we maximize the optimized centroids to …
the OWASP list of 10002 weak passwords. After that, we maximize the optimized centroids to …