[HTML][HTML] Encouraging users to improve password security and memorability

M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
websitespassword restriction policies and password advice are vastly different, sometimes
caused conflict between them. In most of the websites, password … In this analysis, there was …

Why people (don't) use password managers effectively

S Pearman, SA Zhang, L Bauer, N Christin… - … Symposium on Usable …, 2019 - usenix.org
… understanding of websites, browsers, and password saving … nudge these users to adopt
safer password practices. Chrome 69, … Our analysis of 30 interviews with non-users of password

" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers

A Naiakshina, A Danilova, E Gerlitz… - Proceedings of the …, 2019 - dl.acm.org
websites with few security features have the worst security practices and assumed they use
passwords … Qualitative Analysis Next, we present a qualitative analysis of the data we gath…

e‐Authentication for online assessment: A mixed‐method study

A Okada, D Whitelock, W Holmes… - British Journal of …, 2019 - Wiley Online Library
practice at the moment. A considerable gap is to understand whether the use of e-authentication
systems would increase trust on e-assessment… -based e-assessment system for learning …

Passgan: A deep learning approach for password guessing

B Hitaj, P Gasti, G Ateniese, F Perez-Cruz - Applied Cryptography and …, 2019 - Springer
… for system administrators to re-evaluate password policies. … Before using these passwords
in our evaluation, we sorted … model is trained on password leaks from several websites, in our …

Examining the adoption and abandonment of security, privacy, and identity theft protection practices

Y Zou, K Roundy, A Tamersoy, S Shintre… - Proceedings of the …, 2020 - dl.acm.org
… Statistical analysis Using the re-coded dataset, we … reason for privacy practices like avoiding
websites that ask for real … different practices, such as updating software, using a password

Beyond credential stuffing: Password similarity models using neural networks

B Pal, T Daniel, R Chatterjee… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
… that estimate P ( w | w ), where w is a leaked password from one … website password policies,
for simplicity, we will ignore the effect of password policy for now and consider all passwords

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
… measures such as password policies. Still, research has shown that password policies often
lead … the abortion of password creation (Inglesant and Sasse, 2010, Komanduri et al., 2011). …

Protecting accounts from credential stuffing with password breach alerting

K Thomas, J Pullman, K Yeo, A Raghunathan… - 28th USENIX Security …, 2019 - usenix.org
… so via password composition policies) specifically … page involved, which we use to estimate
our compatibility with popular sites and to estimate the prevalence of breached passwords

A survey on smartphone user's security choices, awareness and education

F Breitinger, R Tully-Doyle, C Hassenfeldt - Computers & Security, 2020 - Elsevier
… cybersecurity familiarity into consideration in the analysis of user practices as well as have
a … same practices affiliated with phones as with the low expertise group. Password handling …