Zobrazeno 1 - 10
of 387
pro vyhledávání: '"Password psychology"'
Autor:
Carlisle Adams
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Encyclopedia of Cryptography and Security (2nd Ed.)
Encyclopedia of Cryptography and Security (2nd Ed.)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::be2ae9ebb9e704a4486a3cc5a1277e07
https://doi.org/10.1007/978-3-642-27739-9_89-2
https://doi.org/10.1007/978-3-642-27739-9_89-2
Autor:
Naomi Woods, Mikko T. Siponen
Publikováno v:
International Journal of Human-Computer Studies. 111:36-48
Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in respon
Publikováno v:
Journal of Computers. :692-704
Publikováno v:
IEEE Transactions on Information Forensics and Security. 12:2574-2589
Textual passwords remain the most commonly employed user authentication mechanism, and potentially will continue to be so for years to come. Despite the well-known security and usability issues concerning textual passwords, none of the numerous propo
Publikováno v:
IEEE Transactions on Information Forensics and Security. 12:2320-2333
While it is not recommended, Internet users tend to include personal information in their passwords for easy memorization. However, the use of personal information in passwords and its security implications have yet to be studied. In this paper, we d
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 14:550-564
In this paper, we conduct a large-scale study on the crackability, correlation, and security of ${\sim}145$ million real world passwords, which were leaked from several popular Internet services and applications. To the best of our knowledge, this is
Publikováno v:
Cluster Computing. 21:1161-1173
User authentication is necessary to provide services on an application system and the Internet. Various authentication methods are used such as ID/PW, biometric, and OTP authentications. One of the popular authentications is ID/PW authentication. As
Publikováno v:
International Journal of Human-Computer Studies. 100:1-17
We propose – and experimentally test – a mnemonic variant of password security that uses game positions as passwords. In Experiment 1, we report accuracy and reaction time data when high school student, younger adult, and older adult participants
Autor:
Yee-Yin Choong, Kristen Greene
Publikováno v:
Information & Computer Security. 25:80-99
Purpose The purpose of this research is to investigate user comprehension of ambiguous terminology in password rules. Although stringent password policies are in place to protect information system security, such complexity does not have to mean ambi
Autor:
N. K. Sreelaja, N. K. Sreeja
Publikováno v:
Security and Communication Networks. 9:5733-5745
Authentication plays a major role in ensuring the security of the system by allowing only the authorized user. The traditional authentication system of using text-based passwords has many flaws in the aspects of usability and security issues. Hence,