Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

A research agenda acknowledging the persistence of passwords

C Herley, P Van Oorschot - IEEE Security & privacy, 2011 - ieeexplore.ieee.org
Despite countless attempts and near-universal desire to replace them, passwords are more
widely used and firmly entrenched than ever. The authors' exploration leads them to argue …

[PDF][PDF] The tangled web of password reuse.

A Das, J Bonneau, M Caesar, N Borisov, XF Wang - NDSS, 2014 - cs.umd.edu
Today's Internet services rely heavily on text-based passwords for user authentication. The
pervasiveness of these services coupled with the difficulty of remembering large numbers of …

{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices

I Ion, R Reeder, S Consolvo - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …

The password life cycle

E Stobert, R Biddle - ACM Transactions on Privacy and Security (TOPS), 2018 - dl.acm.org
Managing passwords is a difficult task for users, who must create, remember, and keep track
of large numbers of passwords. In this work, we investigated users' coping strategies for …

Why people (don't) use password managers effectively

S Pearman, SA Zhang, L Bauer, N Christin… - … Symposium on Usable …, 2019 - usenix.org
Security experts often recommend using password-management tools that both store
passwords and generate random passwords. However, research indicates that only a small …

An efficient user verification system via mouse movements

N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …

[图书][B] Usable security: History, themes, and challenges

S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …

Two-factor authentication: is the world ready? Quantifying 2FA adoption

T Petsas, G Tsirantonakis, E Athanasopoulos… - Proceedings of the …, 2015 - dl.acm.org
As text-based passwords continue to be the dominant form for user identification today,
services try to protect their costumers by offering enhanced, and more secure, technologies …

Multiple password interference in text passwords and click-based graphical passwords

S Chiasson, A Forget, E Stobert… - Proceedings of the 16th …, 2009 - dl.acm.org
The underlying issues relating to the usability and security of multiple passwords are largely
unexplored. However, we know that people generally have difficulty remembering multiple …