Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system: comprehensive review, open …

ML Shuwandy, BB Zaidan, AA Zaidan… - Computer Science …, 2020 - Elsevier
Patient authentication acquires superior attention as a necessary security requirement in a
remote health monitoring system. From a usability perspective, credential-based …

" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab

B Ur, F Noma, J Bees, SM Segreti, R Shay… - Eleventh symposium on …, 2015 - usenix.org
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …

Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms

PG Kelley, S Komanduri, ML Mazurek… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
Text-based passwords remain the dominant authentication method in computer systems,
despite significant advancement in attackers' capabilities to perform password cracking. In …

Of passwords and people: measuring the effect of password-composition policies

S Komanduri, R Shay, PG Kelley, ML Mazurek… - Proceedings of the …, 2011 - dl.acm.org
Text-based passwords are the most common mechanism for authenticating humans to
computer systems. To prevent users from picking passwords that are too easy for an …

Encouraging users to improve password security and memorability

M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …

Understanding password choices: How frequently entered passwords are re-used across websites

R Wash, E Rader, R Berman, Z Wellmer - Twelfth Symposium on Usable …, 2016 - usenix.org
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …

Encountering stronger password requirements: user attitudes and behaviors

R Shay, S Komanduri, PG Kelley, PG Leon… - Proceedings of the sixth …, 2010 - dl.acm.org
Text-based passwords are still the most commonly used authentication mechanism in
information systems. We took advantage of a unique opportunity presented by a significant …

Measuring password guessability for an entire university

ML Mazurek, S Komanduri, T Vidas, L Bauer… - Proceedings of the …, 2013 - dl.acm.org
Despite considerable research on passwords, empirical studies of password strength have
been limited by lack of access to plaintext passwords, small data sets, and password sets …

How does your password measure up? The effect of strength meters on password creation

B Ur, PG Kelley, S Komanduri, J Lee, M Maass… - 21st USENIX security …, 2012 - usenix.org
To help users create stronger text-based passwords, many web sites have deployed
password meters that provide visual feedback on password strength. Although these meters …