Honeyword-based authentication techniques for protecting passwords: A survey

N Chakraborty, J Li, VCM Leung, S Mondal… - ACM Computing …, 2022 - dl.acm.org
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest
in 2013, has emerged as a security mechanism that can provide security against server-side …

A scrutiny of honeyword generation methods: Remarks on strengths and weaknesses points

YA Yasser, AT Sadiq, W AlHamdani - Cybernetics and Information …, 2022 - sciendo.com
Honeyword system is a successful password cracking detection system. Simply the
honeywords are (False passwords) that are accompanied to the sugarword (Real …

How Password Strength Becomes a Weak Link for Honeywords

M Vydelingum, MV Martin - 2023 11th International Conference …, 2023 - ieeexplore.ieee.org
Passwords are used as the first layer of security in today's society. As cybercrime increases,
the need for password security increases. The objective of this report is to share some …

Toward Developing a Password Breach Detection Technique for Serving the Purpose of Honeywords

A Banik, A Das, A Dey - 2022 IEEE International Women in …, 2022 - ieeexplore.ieee.org
In the era of computer systems, user authentication, both online and offline, is an
unavoidable step for securing users' privacy. Password-based authentication is popularly …

[PDF][PDF] Generating Honeyword Based on A Proposed Bees Algorithm

YA Yasser, AT Sadiq, W AlHamdani - IRAQI JOURNAL OF COMPUTERS …, 2022 - iasj.net
Honeywords are fake passwords that are typically companions to the real password
“sugarword.” The honeyword technique is a password cracking detection technique that …