Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics …

JL Jenkins, M Grimes, JG Proudfoot… - Information Technology …, 2014 - Taylor & Francis
Password reuse–using the same password for multiple accounts–is a prevalent
phenomenon that can make even the most secure systems vulnerable. When passwords are …

Am I really at risk? Determinants of online users' intentions to use strong passwords

L Zhang, WC McDowell - Journal of Internet Commerce, 2009 - Taylor & Francis
By using the protection motivation theory, this article tests a model of password protection
intentions for online users. Hypotheses are proposed concerning the intention to engage in …

Password entropy and password quality

W Ma, J Campbell, D Tran… - 2010 fourth international …, 2010 - ieeexplore.ieee.org
Passwords are the first line of defense for many computerized systems. The quality of these
passwords decides the security strength of these systems. Many studies advocate using …

Improving multiple-password recall: an empirical study

J Zhang, X Luo, S Akkaladevi… - European Journal of …, 2009 - Taylor & Francis
As one of the most common authentication methods, passwords help secure information by
granting access only to authorized parties. To be effective, passwords should be strong …

[PDF][PDF] Password security: an analysis of password strengths and vulnerabilities

K Chanda - International Journal of Computer Network and …, 2016 - mecs-press.org
Passwords can be used to gain access to specific data, an account, a computer system or a
protected space. A single user may have multiple accounts that are protected by passwords …

Impact of restrictive composition policy on user password choices

J Campbell, W Ma, D Kleeman - Behaviour & Information …, 2011 - Taylor & Francis
This study investigates the efficacy of using a restrictive password composition policy. The
primary function of access controls is to restrict the use of information systems and other …

[PDF][PDF] Modeling the Adversary to Evaluate Password Strength With Limited Samples.

S Komanduri - 2016 - reports-archive.adm.cs.cmu.edu
In an effort to improve security by preventing users from picking weak passwords, system
administrators set password-composition policies, sets of requirements that passwords must …

On improving the memorability of system-assigned recognition-based passwords

MN Al-Ameen, ST Marne, K Fatema… - Behaviour & …, 2022 - Taylor & Francis
User-chosen passwords reflecting common strategies and patterns ease memorisation but
offer uncertain and often weak security, while system-assigned passwords provide higher …

A new multimodal approach for password strength estimation—Part II: Experimental evaluation

J Galbally, I Coisel, I Sanchez - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A novel multimodal method for the estimation of password strength was presented in Part I of
this series of two papers. In this paper, the experimental framework used for the evaluation …

[PDF][PDF] A conceptual framework for assessing password quality

W Ma, J Campbell, D Tran, D Kleeman - International Journal of …, 2007 - academia.edu
Password authentication is the most widely used authentication mechanism, and it will still
be with us for many years yet to come. It is effective, simple, and accurate, with no extra cost …