Investigating the third dimension for authentication in immersive virtual reality and in the real world
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial
applications will require user authentication. Similarly, smart homes in the real world (RW) …
applications will require user authentication. Similarly, smart homes in the real world (RW) …
Enhancing the user authentication process with colour memory cues
The authentication process is the first line of defence against potential impostors, and
therefore is an important concern when protecting personal and organisational data …
therefore is an important concern when protecting personal and organisational data …
Reinforcing system-assigned passphrases through implicit learning
People tend to choose short and predictable passwords that are vulnerable to guessing
attacks. Passphrases are passwords consisting of multiple words, initially introduced as …
attacks. Passphrases are passwords consisting of multiple words, initially introduced as …
A look into user privacy andthird-party applications in Facebook
Purpose A huge amount of personal and sensitive data are shared on Facebook, which
makes it a prime target for attackers. Adversaries can exploit third-party applications …
makes it a prime target for attackers. Adversaries can exploit third-party applications …
Locimotion: Towards learning a strong authentication secret in a single session
In this work, we design and evaluate LociMotion, a training interface to learn a strong
authentication secret in a single session. LociMotion automatically takes a random …
authentication secret in a single session. LociMotion automatically takes a random …
[PDF][PDF] A Comparison of Three Approaches to Assist Users in Memorizing System-Assigned Passwords
Users struggle to select strong passwords. System-assigned passwords address this
problem, but they can be difficult for users to memorize. While password managers can help …
problem, but they can be difficult for users to memorize. While password managers can help …
Is my password strong enough?: A study on user perception in the develo** world
INTRODUCTION: The first line of defense in the cyber world is strong and difficult to predict
passwords. However, users often choose highly predictable passwords based on personal …
passwords. However, users often choose highly predictable passwords based on personal …
Passwords and Cryptwords: The Final Limits on Lengths
Computers get faster every year; brains don't. Passwords and other memorized credentials
have unique usability advantages over tokens and biometrics, so we desire to design secure …
have unique usability advantages over tokens and biometrics, so we desire to design secure …
Surviving in the digital environment: Does survival processing provide an additional memory benefit to password generation strategies?
People encouraged to think about their survival when encoding information experience a
memory advantage even when compared to other tried-and-true methods. Despite the …
memory advantage even when compared to other tried-and-true methods. Despite the …
Password Assistance
M Horsch, J Braun, J Buchmann - 2017 - dl.gi.de
For decades, users are not able to realize secure passwords for their user accounts at
Internet services. Users' passwords need to fulfil general security requirements and the …
Internet services. Users' passwords need to fulfil general security requirements and the …