Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a …
Human memory has notable limitations (eg, forgetting) which have necessitated a variety of memory aids (eg, calendars). As we grow closer to mass adoption of everyday Extended …
Users share their personal devices with different entities in various circumstances. While prior research shed light on the broad reasons behind the sharing of mobile phones, there is …
N Woods, M Siponen - International Journal of Human-Computer Studies, 2019 - Elsevier
Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors …
MN Al-Ameen, T Tamanna, S Nandy… - Proceedings of the 3rd …, 2020 - dl.acm.org
With a rapid increase in the use of digital technologies, people in the Global South including Bangladesh are exposed to a wide-range of smartphone applications (termed as apps in …
D Wang, P Wang - Computer Security--ESORICS 2015: 20th European …, 2015 - Springer
While much has changed in Internet security over the past decades, textual passwords remain as the dominant method to secure user web accounts and they are proliferating in …
Y Guo, Z Zhang, Y Guo - Computers & Security, 2019 - Elsevier
User-generated textual passwords suffer from the conflict between security and usability. System administrators usually adopt password composition policies to help users choose …
Y Guo, Z Zhang, Y Guo, X Guo - Computers & Security, 2020 - Elsevier
Password composition policies are used to prevent users from picking weak passwords. A website usually provides a unified password policy for each user but ignores the fact that …
The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance …