A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage

Y Zhang, C Xu, H Li, K Yang, N Cheng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Password-based single-sign-on authentication has been widely applied in mobile
environments. It enables an identity server to issue authentication tokens to mobile users …

How to attack and generate honeywords

D Wang, Y Zou, Q Dong, Y Song… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …

Honeyword-based authentication techniques for protecting passwords: A survey

N Chakraborty, J Li, VCM Leung, S Mondal… - ACM Computing …, 2022 - dl.acm.org
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest
in 2013, has emerged as a security mechanism that can provide security against server-side …

A {Large-Scale} Measurement of Website Login Policies

S Al Roomi, F Li - 32nd USENIX Security Symposium (USENIX Security …, 2023 - usenix.org
Authenticating on a website using a password involves a multi-stage login process, where
each stage entails critical policy and implementation decisions that impact login security and …

Generalized fuzzy password-authenticated key exchange from error correcting codes

J Bootle, S Faller, J Hesse, K Hostáková… - … Conference on the …, 2023 - Springer
Abstract Fuzzy Password-Authenticated Key Exchange (fuzzy PAKE) allows cryptographic
keys to be generated from authentication data that is both fuzzy and of low entropy. The …

ttPAKE: Typo tolerance password-authenticated key exchange

Y Han, C Xu, S Li, C Jiang, K Chen - Journal of Information Security and …, 2023 - Elsevier
Error tolerant password-authenticated key exchange (PAKE) allows a user to authenticate to
a server using a password and agree on a session key with the server, provided that the …

A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication

L Zhou, K Wang, J Lai, D Zhang - IEEE Transactions on Human …, 2023 - ieeexplore.ieee.org
The pervasive use of mobile devices exposes users to an elevated risk of shoulder-surfing
attacks. Despite the prior work on shoulder-surfing resistance of mobile user authentication …

Obfuscated fuzzy hamming distance and conjunctions from subset product problems

SD Galbraith, L Zobernig - Theory of Cryptography Conference, 2019 - Springer
We consider the problem of obfuscating programs for fuzzy matching (in other words, testing
whether the Hamming distance between an n-bit input and a fixed n-bit target vector is …

Don't forget the stuffing! revisiting the security impact of typo-tolerant password authentication

S Sahin, F Li - Proceedings of the 2021 ACM SIGSAC Conference on …, 2021 - dl.acm.org
To enhance the usability of password authentication, typo-tolerant password authentication
schemes permit certain deviations in the user-supplied password, to account for common …