[图书][B] Computer science handbook

AB Tucker - 2004 - taylorfrancis.com
When you think about how far and fast computer science has progressed in recent years, it's
not hard to conclude that a seven-year old handbook may fall a little short of the kind of …

[图书][B] Authentication: from passwords to public keys

RE Smith - 2001 - dl.acm.org
Computer access control is an ongoing challenge. Left to themselves, computers tend to
treat one user no differently than another. Computers use authentication to confidently …

Human selection of mnemonic phrase-based passwords

C Kuo, S Romanosky, LF Cranor - … of the second symposium on Usable …, 2006 - dl.acm.org
Textual passwords are often the only mechanism used to authenticate users of a networked
system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to …

Towards reliable storage of 56-bit secrets in human memory

J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …

Guessing human-chosen secrets

J Bonneau - 2012 - cl.cam.ac.uk
Authenticating humans to computers remains a notable weak point in computer security
despite decades of effort. Although the security research community has explored dozens of …

[PDF][PDF] Authentication, Access Controls, and Intrusion Detection.

RS Sandhu, P Samarati - The Computer Science and Engineering …, 1997 - Citeseer
An important requirement of any information management system is to protect information
against improper disclosure or modi cation (known as con dentiality and integrity …

Analyzing user password selection behavior for reduction of password space

RV Yampolskiy - Proceedings 40th annual 2006 international …, 2006 - ieeexplore.ieee.org
This paper presents a comprehensive survey of recent literature on the topic of password
dictionaries for alphanumeric and graphical user authentication approaches including some …

A comparative study of three random password generators

MD Leonhard… - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
This paper compares three random password generation schemes, describing and
analyzing each. It also reports the results of a small study testing the quality of the …

An empirical analysis on the usability and security of passwords

KS Walia, S Shenoy, Y Cheng - 2020 IEEE 21st International …, 2020 - ieeexplore.ieee.org
Security and usability are two essential aspects of a system, but they usually move in
opposite directions. Sometimes, to achieve security, usability has to be compromised, and …

Locimotion: Towards learning a strong authentication secret in a single session

J Doolani, M Wright, R Setty, SMT Haque - Proceedings of the 2021 CHI …, 2021 - dl.acm.org
In this work, we design and evaluate LociMotion, a training interface to learn a strong
authentication secret in a single session. LociMotion automatically takes a random …