Persuasion for stronger passwords: Motivation and pilot study

A Forget, S Chiasson, PC Van Oorschot… - … PERSUASIVE 2008, Oulu …, 2008 - Springer
Text passwords are the ubiquitous method of authentication, used by most people for most
online services. Many people choose weak passwords that are vulnerable to attackers who …

I know what you did last week! do you? dynamic security questions for fallback authentication on smartphones

A Hang, A De Luca, H Hussmann - Proceedings of the 33rd Annual ACM …, 2015 - dl.acm.org
In this paper, we present the design and evaluation of dynamic security questions for
fallback authentication. In case users lose access to their device, the system asks questions …

I'm too busy to reset my LinkedIn password: On the effectiveness of password reset emails

JH Huh, H Kim, SSVP Rayala, RB Bobba… - Proceedings of the …, 2017 - dl.acm.org
A common security practice used to deal with a password breach is locking user accounts
and sending out an email to tell users that they need to reset their password to unlock their …

[HTML][HTML] Password-hashing status

G Hatzivasilis - Cryptography, 2017 - mdpi.com
Computers are used in our everyday activities, with high volumes of users accessing
provided services. One-factor authentication consisting of a username and a password is the …

System and methods for weak authentication data reinforcement

MC Lee - US Patent 8,266,682, 2012 - Google Patents
This document discusses, among other things, a system and methods for weak
authentication data reinforcement. In an example embodiment, authentication data is …

Enhanced evaluation model of security strength for passwords using integrated korean and english password dictionaries

KH Hong, UG Kang, BM Lee - Security and Communication …, 2021 - Wiley Online Library
In the field of information security, passwords are a means of authenticating users.
Passwords with weak security cannot perform the role of user authentication and personal …

[PDF][PDF] E-Öğrenme ve e-sınavlar: Çevrimiçi ölçme değerlendirme süreçlerinde kimlik doğrulama yöntemlerine ilişkin öğrenen görüşlerinin incelenmesi

A Bozkurt, U Hasan - Mersin Üniversitesi Eğitim Fakültesi Dergisi, 2018 - dergipark.org.tr
Uzaktan eğitimde çevrimiçi öğrenme ortamlarıyla beraber bu ortamlarda yapılan sınavlar da
yaygınlaşmaktadır. Kimlik doğrulama yöntemleri çevrimiçi sınav güvenliğini arttırmasına …

Secure bimodal PIN-entry method using audio signals

MK Lee, H Nam, DK Kim - Computers & Security, 2016 - Elsevier
Abstract A Personal Identification Number (PIN) is a multiple-digit sequence widely used for
user authentication. It is desirable for a PIN-entry method to be secure against two main …

Assessing password guidance and enforcement on leading websites

S Furnell - Computer Fraud & Security, 2011 - Elsevier
For more than five decades, passwords have been the dominant means of user
authentication for IT systems and are now used on a daily basis by millions of users …

Investigating the Password Policy Practices of Website Administrators

S Sahin, S Al Roomi, T Poteat… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Passwords are the de facto standard for online authentication today, and will likely remain
so for the foreseeable future. As a consequence, the security community has extensively …