[HTML][HTML] Internet of things: Security and solutions survey
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …
each aspect of everyday living is creating a promising prospect for the involvement of …
Modern authentication schemes in smartphones and IoT devices: An empirical survey
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
The science of guessing: analyzing an anonymized corpus of 70 million passwords
J Bonneau - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
We report on the largest corpus of user-chosen passwords ever studied, consisting of
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Recently, He et al. proposed an anonymous two-factor authentication scheme following the
concept of temporal-credential for wireless sensor networks (WSNs), which is claimed to be …
concept of temporal-credential for wireless sensor networks (WSNs), which is claimed to be …
An {Administrator's} Guide to Internet Password Research
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …
securing web-facing services or setting policies. With a view to improving this situation we …
Captcha as graphical passwords—A new security primitive based on hard AI problems
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
Secrets, lies, and account recovery: Lessons from the use of personal knowledge questions at google
We examine the first large real-world data set on personal knowledge question's security
and memorability from their deployment at Google. Our analysis confirms that secret …
and memorability from their deployment at Google. Our analysis confirms that secret …
fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars
To provide timely feedbacks to users, nearly every respectable Internet service now imposes
a password strength meter (PSM) upon user registration or password change. It is a rare bit …
a password strength meter (PSM) upon user registration or password change. It is a rare bit …