[HTML][HTML] Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

The science of guessing: analyzing an anonymized corpus of 70 million passwords

J Bonneau - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
We report on the largest corpus of user-chosen passwords ever studied, consisting of
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang - Journal of Network and …, 2016 - Elsevier
Recently, He et al. proposed an anonymous two-factor authentication scheme following the
concept of temporal-credential for wireless sensor networks (WSNs), which is claimed to be …

An {Administrator's} Guide to Internet Password Research

D Florêncio, C Herley, PC Van Oorschot - 28th large installation system …, 2014 - usenix.org
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …

Captcha as graphical passwords—A new security primitive based on hard AI problems

BB Zhu, J Yan, G Bao, M Yang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …

Secrets, lies, and account recovery: Lessons from the use of personal knowledge questions at google

J Bonneau, E Bursztein, I Caron, R Jackson… - Proceedings of the 24th …, 2015 - dl.acm.org
We examine the first large real-world data set on personal knowledge question's security
and memorability from their deployment at Google. Our analysis confirms that secret …

fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars

D Wang, D He, H Cheng, P Wang - 2016 46th Annual IEEE …, 2016 - ieeexplore.ieee.org
To provide timely feedbacks to users, nearly every respectable Internet service now imposes
a password strength meter (PSM) upon user registration or password change. It is a rare bit …