Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system: comprehensive review, open …
Patient authentication acquires superior attention as a necessary security requirement in a
remote health monitoring system. From a usability perspective, credential-based …
remote health monitoring system. From a usability perspective, credential-based …
" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …
documented features that lead to easily guessed passwords, but have not probed why users …
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
Text-based passwords remain the dominant authentication method in computer systems,
despite significant advancement in attackers' capabilities to perform password cracking. In …
despite significant advancement in attackers' capabilities to perform password cracking. In …
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to
computer systems. To prevent users from picking passwords that are too easy for an …
computer systems. To prevent users from picking passwords that are too easy for an …
Encouraging users to improve password security and memorability
M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …
but rather by the limitations of human memory, and human perceptions together with their …
Understanding password choices: How frequently entered passwords are re-used across websites
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …
use. Yet, users do not always have good password security practices, leaving their accounts …
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in
information systems. We took advantage of a unique opportunity presented by a significant …
information systems. We took advantage of a unique opportunity presented by a significant …
Measuring password guessability for an entire university
Despite considerable research on passwords, empirical studies of password strength have
been limited by lack of access to plaintext passwords, small data sets, and password sets …
been limited by lack of access to plaintext passwords, small data sets, and password sets …
How does your password measure up? The effect of strength meters on password creation
To help users create stronger text-based passwords, many web sites have deployed
password meters that provide visual feedback on password strength. Although these meters …
password meters that provide visual feedback on password strength. Although these meters …