Security and usability in knowledge-based user authentication: A review

C Katsini, M Belk, C Fidas, N Avouris… - Proceedings of the 20th …, 2016 - dl.acm.org
This paper presents a comprehensive review of state-of-the-art research works in
knowledge-based user authentication, covering the security and usability aspects of the …

[PDF][PDF] Systematic overview of password security problems

V Taneski, M Heričko, B Brumen - Acta Polytechnica Hungarica, 2019 - epa.niif.hu
Alphanumeric passwords are the first line of defense in security for most information
systems. Morris and Thompson identified passwords as a weak point in an Information …

Guidelines for usable cybersecurity: Past and present

JRC Nurse, S Creese, M Goldsmith… - … on cyberspace safety …, 2011 - ieeexplore.ieee.org
Usability is arguably one of the most significant social topics and issues within the field of
cybersecurity today. Supported by the need for confidentiality, integrity, availability and other …

Password security—No change in 35 years?

V Taneski, M Heričko, B Brumen - 2014 37th International …, 2014 - ieeexplore.ieee.org
Textual passwords were first identified as a weak point in information system's security by
Morris and Thompson in 1979. They found that 86% of the passwords were weak: being too …

Cryptography and relational database management systems

J He, M Wang - Proceedings 2001 International Database …, 2001 - ieeexplore.ieee.org
Security is becoming one of the most urgent challenges in database research and industry,
and the challenge is intensifying due to the enormous popularity of e-business. The authors …

Usblock: Blocking usb-based keypress injection attacks

S Neuner, AG Voyiatzis, S Fotopoulos… - Data and Applications …, 2018 - Springer
Abstract The Universal Serial Bus (USB) is becoming a prevalent attack vector. Rubber
Ducky and BadUSB are two recent classes of a whole spectrum of attacks carried out using …

[图书][B] Human-centred web adaptation and personalization

P Germanakos, M Belk - 2016 - Springer
The rapid evolution of heterogeneous and ubiquitous technologies in recent years, along
with the growing demand for automation of services and content delivery, generated a …

An empirical study on the web password strength in Greece

AG Voyiatzis, CA Fidas, DN Serpanos… - 2011 15th …, 2011 - ieeexplore.ieee.org
Text passwords are commonly used for user authentication in the web. There is lately a
strong interest for case studies on the password habits of populations with different cultures …

Sensitivity analysis of loss of corporate efficiency and productivity associated with enterprise DRM technology

W Zeng, K Liu - 2012 Seventh International Conference on …, 2012 - ieeexplore.ieee.org
Enterprise Digital Rights Management (EDRM) was developed to help corporations keep
digital documents secure, as one of many digital information security solutions. However …

Notary-assisted certificate pinning for improved security of android apps

G Merzdovnik, D Buhov, AG Voyiatzis… - … and Security (ARES), 2016 - ieeexplore.ieee.org
The security provided to Internet applications by the TLS protocol relies on the trust we put
on Certificate Authorities (CAs) issuing valid identity certificates. TLS certificate pinning is a …