There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as``usable …
PS Kochhar, F Thung, D Lo - 2015 IEEE 22nd international …, 2015 - ieeexplore.ieee.org
During software maintenance, testing is a crucial activity to ensure the quality of program code as it evolves over time. With the increasing size and complexity of software, adequate …
How can we encourage end-user acceptance of expert recommended cybersecurity and privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
Password vaults are increasingly popular applications that store multiple passwords encrypted under a single master password that the user memorizes. A password vault can …
Y Li, H Wang, K Sun - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
While it is not recommended, Internet users tend to include personal information in their passwords for easy memorization. However, the use of personal information in passwords …
S Ruoti, B Roberts, K Seamons - … of the 24th international conference on …, 2015 - dl.acm.org
Passwords continue to dominate the authentication landscape in spite of numerous proposals to replace them. Even though usability is a key factor in replacing passwords, very …
This paper explores what motivates password manager (PM) users in the US to switch from one PM to another, the techniques they employ when switching, and challenges they …
A password is considered to be the first line of defence in protecting online accounts, but there are problems when people handle their own passwords, for example, password reuse …
J Simmons, O Diallo, S Oesch, S Ruoti - Proceedings of the 37th Annual …, 2021 - dl.acm.org
Despite efforts to replace them, passwords remain the primary form of authentication on the web. Password managers seek to address many of the problems with passwords by helping …