Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
Leveraging behavioral science to mitigate cyber security risk
SL Pfleeger, DD Caputo - Computers & security, 2012 - Elsevier
Most efforts to improve cyber security focus primarily on incorporating new technological
approaches in products and processes. However, a key element of improvement involves …
approaches in products and processes. However, a key element of improvement involves …
" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …
documented features that lead to easily guessed passwords, but have not probed why users …
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
Text-based passwords remain the dominant authentication method in computer systems,
despite significant advancement in attackers' capabilities to perform password cracking. In …
despite significant advancement in attackers' capabilities to perform password cracking. In …
[HTML][HTML] Encouraging users to improve password security and memorability
M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …
but rather by the limitations of human memory, and human perceptions together with their …
Understanding password choices: How frequently entered passwords are re-used across websites
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …
use. Yet, users do not always have good password security practices, leaving their accounts …
An efficient user verification system via mouse movements
N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
N Gunson, D Marshall, H Morton, M Jack - Computers & Security, 2011 - Elsevier
This paper describes an experiment to investigate user perceptions of the usability and
security of single-factor and two-factor authentication methods in automated telephone …
security of single-factor and two-factor authentication methods in automated telephone …
The security of modern password expiration: An algorithmic framework and empirical analysis
This paper presents the first large-scale study of the success of password expiration in
meeting its intended purpose, namely revoking access to an account by an attacker who has …
meeting its intended purpose, namely revoking access to an account by an attacker who has …