Modern authentication schemes in smartphones and IoT devices: An empirical survey
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
[HTML][HTML] A survey exploring open source Intelligence for smarter password cracking
From the end of the last century to date, consumers are increasingly living their lives online.
In today's world, the average person spends a significant proportion of their time connecting …
In today's world, the average person spends a significant proportion of their time connecting …
No single silver bullet: Measuring the accuracy of password strength meters
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …
password strength meter (PSM) to provide real-time strength feedback upon user …
A novel dictionary generation methodology for contextual-based password cracking
It has been more than 50 years since the concept of passwords was introduced and adopted
in our society as a digital authentication method. Despite alternative authentication methods …
in our society as a digital authentication method. Despite alternative authentication methods …
[HTML][HTML] How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts
Passwords have been and still remain the most common method of authentication in
computer systems. These systems are therefore privileged targets of attackers, and the …
computer systems. These systems are therefore privileged targets of attackers, and the …
A new multimodal approach for password strength estimation—Part I: Theory and algorithms
After more than two decades of research in the field of password strength estimation, one
clear conclusion may be drawn: no password strength metric by itself is better than all other …
clear conclusion may be drawn: no password strength metric by itself is better than all other …
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
Using the computational resources of an untrusted third party to crack a password hash can
pose a high number of privacy and security risks. The act of revealing the hash digest could …
pose a high number of privacy and security risks. The act of revealing the hash digest could …
[PDF][PDF] Enhancing Multi-Class Password Strength Prediction Through Machine Learning and Ensemble Techniques.
EF Aziz, MR Baker - International Journal of Safety & Security …, 2024 - researchgate.net
Password strength prediction plays an important role in improving protection against cyber
threats as their frequency increases. Typically, rules are used more specifically, but not all …
threats as their frequency increases. Typically, rules are used more specifically, but not all …
Password guessability as a service (PGaaS)
J Bojato, D Donado, M Jimeno, G Moreno… - Applied Sciences, 2022 - mdpi.com
This paper presents an adaptable password guessability service suited for different
password generators according to what a user might need when using such a service. In …
password generators according to what a user might need when using such a service. In …
A review of machine learning techniques in cybersecurity and research opportunities
S Mittal - Machine Learning for Cyber Security, 2022 - degruyter.com
The past few years have seen a dramatic surge in Internet usage of all individuals.
Moreover, this usage has evolved from casual surfing to serious online businesses …
Moreover, this usage has evolved from casual surfing to serious online businesses …