Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

Encouraging users to improve password security and memorability

M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …

How does your password measure up? The effect of strength meters on password creation

B Ur, PG Kelley, S Komanduri, J Lee, M Maass… - 21st USENIX security …, 2012 - usenix.org
To help users create stronger text-based passwords, many web sites have deployed
password meters that provide visual feedback on password strength. Although these meters …

Let's go in for a closer look: Observing passwords in their natural habitat

S Pearman, J Thomas, PE Naeini, H Habib… - Proceedings of the …, 2017 - dl.acm.org
Text passwords---a frequent vector for account compromise, yet still ubiquitous---have been
studied for decades by researchers attempting to determine how to coerce users to create …

Nudge me right: Personalizing online security nudges to people's decision-making styles

E Peer, S Egelman, M Harbach, N Malkin… - Computers in Human …, 2020 - Elsevier
Nudges are simple and effective interventions that alter the architecture in which people
make choices in order to help them make decisions that could benefit themselves or society …

[BOOK][B] Usable security: History, themes, and challenges

S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …

Designing password policies for strength and usability

R Shay, S Komanduri, AL Durity, P Huh… - ACM Transactions on …, 2016 - dl.acm.org
Password-composition policies are the result of service providers becoming increasingly
concerned about the security of online accounts. These policies restrict the space of user …

From very weak to very strong: Analyzing password-strength meters

X de Carné de Carnavalet… - Network and …, 2014 - spectrum.library.concordia.ca
Millions of users are exposed to password-strength meters/checkers at highly popular web
services that use user-chosen passwords for authentication. Recent studies have found …

Can long passwords be secure and usable?

R Shay, S Komanduri, AL Durity, P Huh… - Proceedings of the …, 2014 - dl.acm.org
To encourage strong passwords, system administrators employ password-composition
policies, such as a traditional policy requiring that passwords have at least 8 characters from …

On the ecological validity of a password study

S Fahl, M Harbach, Y Acar, M Smith - … of the Ninth Symposium on Usable …, 2013 - dl.acm.org
The ecological validity of password studies is a complex topic and difficult to quantify. Most
researchers who conduct password user studies try to address the issue in their study …