Memory manipulations in extended reality

E Bonnail, WJ Tseng, M Mcgill, E Lecolinet… - Proceedings of the …, 2023 - dl.acm.org
Human memory has notable limitations (eg, forgetting) which have necessitated a variety of
memory aids (eg, calendars). As we grow closer to mass adoption of everyday Extended …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Optiwords: A new password policy for creating memorable and strong passwords

Y Guo, Z Zhang, Y Guo - Computers & Security, 2019 - Elsevier
User-generated textual passwords suffer from the conflict between security and usability.
System administrators usually adopt password composition policies to help users choose …

Honey, i chunked the passwords: Generating semantic honeywords resistant to targeted attacks using pre-trained language models

F Yu, MV Martin - International Conference on Detection of Intrusions and …, 2023 - Springer
Honeywords are fictitious passwords inserted into databases in order to identify password
breaches. The major challenge is producing honeywords that are difficult to distinguish from …

Constructing secure and memorable passwords

J Kävrestad, M Lennartsson, M Birath… - Information & Computer …, 2020 - emerald.com
Purpose Using authentication to secure data and accounts has grown to be a natural part of
computing. Even if several authentication methods are in existence, using passwords …

A Systematic Analysis of User Evaluations in Security Research

P Hamm, D Harborth, S Pape - … of the 14th International Conference on …, 2019 - dl.acm.org
We conducted a literature survey on reproducibility and replicability of user surveys in
security research. For that purpose, we examined all papers published over the last five …

MASCARA: Systematically generating memorable and secure passphrases

A Mukherjee, K Murali, SK Jha, N Ganguly… - Proceedings of the …, 2023 - dl.acm.org
Passwords are the most common mechanism for authenticating users online. However,
studies have shown that users find it difficult to create and manage secure passwords. To …

Password and passphrase guessing with recurrent neural networks

A Nosenko, Y Cheng, H Chen - Information Systems Frontiers, 2023 - Springer
Most online services continue their reliance on text-based passwords as the primary
authentication mechanism. With a growing number of these services and the limited …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arXiv preprint arXiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

A study on priming methods for graphical passwords

Z Parish, A Salehi-Abari, J Thorpe - Journal of Information Security and …, 2021 - Elsevier
Recent work suggests that a type of nudge or priming technique called the presentation
effect may potentially improve the security of PassPoints-style graphical passwords. These …