D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what is the underlying distribution of user-generated passwords. In this paper, we make a …
The research literature on passwords is rich but little of it directly aids those charged with securing web-facing services or setting policies. With a view to improving this situation we …
Although motivated by both usability and security concerns, the existing literature on click- based graphical password schemes using a single background image (eg, PassPoints) has …
KPL Vu, RW Proctor, A Bhargav-Spantzel… - international journal of …, 2007 - Elsevier
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method …
Passwords are ubiquitous in our daily digital lives. They protect various types of assets ranging from a simple account on an online newspaper website to our health information on …
In the last years, people have been seeing the pervasive use of computer, communication technology and Internet, eg, e-mail, online shopping, banking, gaming, Internet telephony …
D Wang, X Shan, Q Dong, Y Shen, C Jia - 32nd USENIX Security …, 2023 - usenix.org
To help users create stronger passwords, nearly every respectable web service adopts a password strength meter (PSM) to provide real-time strength feedback upon user …
JJ Yan - Proceedings of the 2001 workshop on New security …, 2001 - dl.acm.org
Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In …
We report on what we believe to be the largest dataset (to date) of automated secure shell (SSH) bruteforce attacks. The dataset includes plaintext password guesses in addition to …