Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
Encouraging users to improve password security and memorability
M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …
but rather by the limitations of human memory, and human perceptions together with their …
How does your password measure up? The effect of strength meters on password creation
To help users create stronger text-based passwords, many web sites have deployed
password meters that provide visual feedback on password strength. Although these meters …
password meters that provide visual feedback on password strength. Although these meters …
Let's go in for a closer look: Observing passwords in their natural habitat
Text passwords---a frequent vector for account compromise, yet still ubiquitous---have been
studied for decades by researchers attempting to determine how to coerce users to create …
studied for decades by researchers attempting to determine how to coerce users to create …
Nudge me right: Personalizing online security nudges to people's decision-making styles
Nudges are simple and effective interventions that alter the architecture in which people
make choices in order to help them make decisions that could benefit themselves or society …
make choices in order to help them make decisions that could benefit themselves or society …
[BOOK][B] Usable security: History, themes, and challenges
S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …
Human Computer Interaction with computer Security, more colloquially known as``usable …
Designing password policies for strength and usability
Password-composition policies are the result of service providers becoming increasingly
concerned about the security of online accounts. These policies restrict the space of user …
concerned about the security of online accounts. These policies restrict the space of user …
From very weak to very strong: Analyzing password-strength meters
X de Carné de Carnavalet… - Network and …, 2014 - spectrum.library.concordia.ca
Millions of users are exposed to password-strength meters/checkers at highly popular web
services that use user-chosen passwords for authentication. Recent studies have found …
services that use user-chosen passwords for authentication. Recent studies have found …
Can long passwords be secure and usable?
To encourage strong passwords, system administrators employ password-composition
policies, such as a traditional policy requiring that passwords have at least 8 characters from …
policies, such as a traditional policy requiring that passwords have at least 8 characters from …
On the ecological validity of a password study
The ecological validity of password studies is a complex topic and difficult to quantify. Most
researchers who conduct password user studies try to address the issue in their study …
researchers who conduct password user studies try to address the issue in their study …