Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Targeted online password guessing: An underestimated threat

D Wang, Z Zhang, P Wang, J Yan… - Proceedings of the 2016 …, 2016 - dl.acm.org
While trawling online/offline password guessing has been intensively studied, only a few
studies have examined targeted online guessing, where an attacker guesses a specific …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

A survey on adaptive authentication

P Arias-Cabarcos, C Krupitzer, C Becker - ACM Computing Surveys …, 2019 - dl.acm.org
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …

Understanding password choices: How frequently entered passwords are re-used across websites

R Wash, E Rader, R Berman, Z Wellmer - Twelfth Symposium on Usable …, 2016 - usenix.org
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …

Do users' perceptions of password security match reality?

B Ur, J Bees, SM Segreti, L Bauer, N Christin… - Proceedings of the …, 2016 - dl.acm.org
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …

" It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online

A McDonald, C Barwulor, ML Mazurek… - 30th USENIX Security …, 2021 - usenix.org
We investigate how a population of end-users with especially salient security and privacy
risks---sex workers---conceptualizes and manages their digital safety. The commercial sex …

Secure biometric authentication with de-duplication on distributed cloud storage

K Venkatachalam, P Prabu, A Almutairi… - PeerJ Computer …, 2021 - peerj.com
Cloud computing is one of the evolving fields of technology, which allows storage, access of
data, programs, and their execution over the internet with offering a variety of information …

Determinants of early conformance with information security policies

F Bélanger, S Collignon, K Enget… - Information & …, 2017 - Elsevier
Individuals often fail to perform the security behaviors their organizations request to protect
informational assets. However, forcing individuals into the compliance can trigger undesired …

Birthday, name and bifacial-security: understanding passwords of Chinese web users

D Wang, P Wang, D He, Y Tian - 28th USENIX security symposium …, 2019 - usenix.org
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …