An unexpectedly large count of trees in the West African Sahara and Sahel

M Brandt, CJ Tucker, A Kariryaa, K Rasmussen, C Abel… - Nature, 2020 - nature.com
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …

On the economics of offline password cracking

J Blocki, B Harsha, S Zhou - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
We develop an economic model of an offline password cracker which allows us to make
quantitative predictions about the fraction of accounts that a rational password attacker …

A study of personal information in human-chosen passwords and its security implications

Y Li, H Wang, K Sun - IEEE INFOCOM 2016-The 35th Annual …, 2016 - ieeexplore.ieee.org
Though not recommended, Internet users often include parts of personal information in their
passwords for easy memorization. However, the use of personal information in passwords …

Personal information in passwords and its security implications

Y Li, H Wang, K Sun - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
While it is not recommended, Internet users tend to include personal information in their
passwords for easy memorization. However, the use of personal information in passwords …

Covert timing channel detection method based on time interval and payload length analysis

J Han, C Huang, F Shi, J Liu - Computers & Security, 2020 - Elsevier
Abstract Information leakage is becoming increasingly serious in today's network
environment. Faced with increasingly forceful network defence strategies, attackers are also …

Your culture is in your password: An analysis of a demographically-diverse password dataset

M AlSabah, G Oligeri, R Riley - Computers & security, 2018 - Elsevier
A large number of studies on passwords make use of passwords leaked by attackers who
compromised online services. Frequently, these leaks contain only the passwords …

On the security of cracking-resistant password vaults

M Golla, B Beuscher, M Dürmuth - … of the 2016 ACM SIGSAC conference …, 2016 - dl.acm.org
Password vaults are used to store login credentials, usually encrypted by a master
password, relieving the user from memorizing a large number of complex passwords. To …

Special Characters Usage and Its Effect On Password Security

D He, Z Liu, S Zhu, S Chan… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Continuously preventing weak password attacks is one of the most important initiatives to
secure IoT and smart contract platforms. Despite their significance as crucial components of …

“It's Just a Lot of Prerequisites”: A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator

M Keil, P Markert, M Dürmuth - … of the 2022 European Symposium on …, 2022 - dl.acm.org
Two-factor authentication (2FA) overcomes the insecurity of passwords by adding a second
factor to the authentication process. A variant of 2FA, which is even phishing-resistant unlike …