Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Leveraging behavioral science to mitigate cyber security risk

SL Pfleeger, DD Caputo - Computers & security, 2012 - Elsevier
Most efforts to improve cyber security focus primarily on incorporating new technological
approaches in products and processes. However, a key element of improvement involves …

" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab

B Ur, F Noma, J Bees, SM Segreti, R Shay… - Eleventh symposium on …, 2015 - usenix.org
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …

Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms

PG Kelley, S Komanduri, ML Mazurek… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
Text-based passwords remain the dominant authentication method in computer systems,
despite significant advancement in attackers' capabilities to perform password cracking. In …

[HTML][HTML] Encouraging users to improve password security and memorability

M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …

Understanding password choices: How frequently entered passwords are re-used across websites

R Wash, E Rader, R Berman, Z Wellmer - Twelfth Symposium on Usable …, 2016 - usenix.org
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …

An efficient user verification system via mouse movements

N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …

User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking

N Gunson, D Marshall, H Morton, M Jack - Computers & Security, 2011 - Elsevier
This paper describes an experiment to investigate user perceptions of the usability and
security of single-factor and two-factor authentication methods in automated telephone …

The security of modern password expiration: An algorithmic framework and empirical analysis

Y Zhang, F Monrose, MK Reiter - … of the 17th ACM conference on …, 2010 - dl.acm.org
This paper presents the first large-scale study of the success of password expiration in
meeting its intended purpose, namely revoking access to an account by an attacker who has …