Passwords in use in a university timesharing environment
Computers and Security
High dictionary compression for proactive password checking
ACM Transactions on Information and System Security (TISSEC)
Securing passwords against dictionary attacks
Proceedings of the 9th ACM conference on Computer and communications security
Biometric identification systems
Signal Processing
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
Password Memorability and Security: Empirical Results
IEEE Security and Privacy
A convenient method for securely managing passwords
WWW '05 Proceedings of the 14th international conference on World Wide Web
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations (Handbook of Information Security)
Password policy simulation and analysis
Proceedings of the 2007 ACM workshop on Digital identity management
Memorability of persuasive passwords
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Improving text passwords through persuasion
Proceedings of the 4th symposium on Usable privacy and security
It's not what you know, but who you know: a social approach to last-resort authentication
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
Human-Biometric Sensor Interaction: Impact of Training on Biometric System and User Performance
Proceedings of the Symposium on Human Interface 2009 on Human Interface and the Management of Information. Information and Interaction. Part II: Held as part of HCI International 2009
Multiple password interference in text passwords and click-based graphical passwords
Proceedings of the 16th ACM conference on Computer and communications security
Building a better password: the role of cognitive load in information security training
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Encountering stronger password requirements: user attitudes and behaviors
Proceedings of the Sixth Symposium on Usable Privacy and Security
Of passwords and people: measuring the effect of password-composition policies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Rational security: Modelling everyday password use
International Journal of Human-Computer Studies
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
How does your password measure up? the effect of strength meters on password creation
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Secure and usable authentication on mobile devices
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Measuring password guessability for an entire university
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
The influence of password restrictions and mnemonics on the memory for passwords of older adults
HCI International'13 Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction design - Volume Part I
eHealth in Denmark: A Case Study
Journal of Medical Systems
Hi-index | 0.00 |
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method for authenticating users who attempt to access such information is through the use of username-password combinations. However, this is a weak method of authentication because users tend to generate passwords that are easy to remember but also easy to crack. Proactive password checking, for which passwords must satisfy certain criteria, is one method for improving the security of user-generated passwords. The present study evaluated the time and number of attempts needed to generate unique passwords satisfying different restrictions for multiple accounts, as well as the login time and accuracy for recalling those passwords. Imposing password restrictions alone did not necessarily lead to more secure passwords. However, the use of a technique for which the first letter of each word of a sentence was used coupled with a requirement to insert a special character and digit yielded more secure passwords that were more memorable.