Zobrazeno 1 - 10
of 863
pro vyhledávání: '"Cognitive password"'
Publikováno v:
Journal of Internet Services and Information Security, Vol 7, Iss 1, Pp 14-27 (2017)
The most popular user-authentication method is the password. Many authentication systems try to enhance their security by enforcing a strong password policy, and by using the password as the first factor, something you know, with the second factor be
Externí odkaz:
https://doaj.org/article/1be7b73590bb4b99a62bbaa7584b374c
Publikováno v:
Information & Computer Security. 28:701-717
Purpose Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the most common type of authentication. As long and complex password
Autor:
Carlisle Adams
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Encyclopedia of Cryptography and Security (2nd Ed.)
Encyclopedia of Cryptography and Security (2nd Ed.)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::be2ae9ebb9e704a4486a3cc5a1277e07
https://doi.org/10.1007/978-3-642-27739-9_89-2
https://doi.org/10.1007/978-3-642-27739-9_89-2
Publikováno v:
IEEE Transactions on Information Forensics and Security. 13:545-558
To keep password users from creating simple and common passwords, major websites and applications provide a password-strength measure, namely a password checker. While critical requirements for a password checker to be stringent have prevailed in the
Autor:
Naomi Woods, Mikko T. Siponen
Publikováno v:
International Journal of Human-Computer Studies. 111:36-48
Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in respon
Publikováno v:
Future Generation Computer Systems. 78:699-711
Password authenticated key exchange (PAKE) protocols are designed for a pair of users to establish a secret session key over a public and unreliable network. In existing PAKE protocols, it is assumed that short passwords are pre-shared between users.
The interplay between humans, technology and user authentication: A cognitive processing perspective
Publikováno v:
Computers in Human Behavior
Comput.Hum.Behav.
Comput.Hum.Behav.
This paper investigates the interplay among human cognitive processing differences (field dependence vs. field independence), alternative interaction device types (desktop vs. touch) and user authentication schemes (textual vs. graphical) towards tas
Publikováno v:
IEEE Transactions on Information Forensics and Security. 12:2574-2589
Textual passwords remain the most commonly employed user authentication mechanism, and potentially will continue to be so for years to come. Despite the well-known security and usability issues concerning textual passwords, none of the numerous propo
Publikováno v:
Computer Standards & Interfaces. 54:20-28
Password-based authentication is the current dominant technology for online service providers to confirm the (claimed) identities of legitimate users. Semantic patterns reflect how people choose their passwords, and understanding the patterns is usef
Publikováno v:
Computers & Security. 70:179-198
The passwords for authenticating users are susceptible to shoulder-surfing attacks in which attackers learn users' passwords through direct observations without any technical support. A straightforward solution to defend against such attacks is to ch