KH Hong, UG Kang, BM Lee - Security and Communication …, 2021 - Wiley Online Library
In the field of information security, passwords are a means of authenticating users. Passwords with weak security cannot perform the role of user authentication and personal …
KH Hong, BM Lee - Applied Sciences, 2022 - mdpi.com
It is very important to consider whether a password has been leaked, because security can no longer be guaranteed for passwords exposed to attackers. However, most existing …
G Hatzivasilis - International workshop on model-driven simulation and …, 2020 - Springer
Pairs of usernames and passwords are widely used nowadays by mobile and web applications to identify users. The exposure of this data harms both users and vendors. The …
S Parker, H Yuan, S Li - 2023 IEEE Symposium on Visualization …, 2023 - ieeexplore.ieee.org
Passwords remain the most widely used form of user authentication, despite advancements in other methods. However, their limitations, such as susceptibility to attacks, especially …
X Yu, Q Liao - International Journal of Information Security, 2019 - Springer
While other authentication methods exist, passwords are still the dominant way for user authentication and system security. Over the years, passwords have become long and …
B SHANNAQ - Journal of Theoretical and Applied Information …, 2024 - jatit.org
This research assesses the practicability of machine learning models in classifying consumers according to their passwords with the help of TF-IDF, which depicts exclusive …
A Kim, G Han, SH Seo - J. Internet Serv. Inf. Secur., 2017 - isyou.info
The most popular user-authentication method is the password. Many authentication systems try to enhance their security by enforcing a strong password policy, and by using the …
People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more …
The evolution and convergence of embedded information and communication systems (ICS) technologies has contributed to an era of device-embedded smart objects whose continually …