• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 123
Next 10 →

Password Strength: An Empirical Analysis

by Pietro Michiardi, Yves Roudier
"... Abstract—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools can drastically reduce the number of attempts needed to guess a password. Quite surprisingly, however, existing lit ..."
Abstract - Cited by 27 (0 self) - Add to MetaCart
datasets of known passwords. We find that a “diminishing returns ” principle applies: in the absence of an enforced password strength policy, weak passwords are common; on the other hand, as the attack goes on, the probability that a guess will succeed decreases by orders of magnitude. Even extremely

Analyzing Password Strength

by Martin M. A. Devillers
"... Password authentication is still the most used authentication mechanism in today’s computer systems. In most systems, the password is set by the user and must adhere to certain password requirements. Additionally, password checkers rank the strength of a password to give the user an indication of ho ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Password authentication is still the most used authentication mechanism in today’s computer systems. In most systems, the password is set by the user and must adhere to certain password requirements. Additionally, password checkers rank the strength of a password to give the user an indication

An Experimental Study on the Role of Password Strength and Cognitive Load on Employee Productivity

by Stephen Mujeye, Advisor Dr, Yair Levy
"... research problem that this study seeks to address is the obstacle of password memorability, which is further complicated by the fact that users have many passwords to recall for computers, networks, and Websites among other systems (Wiedenbeck, Waters, Birget, Brodskiy, & Memon, 2005). Wiedenbe ..."
Abstract - Add to MetaCart
different password strengths) over time on the number of failed operating system (OS) logon attempts, users ' average logon times, average task completion times, and amount of requests for assistance, as well as assess the aforementioned relationships when controlled for age, gender, and computer

Guess Again (and again and again): Measuring Password Strength by Simulating Password-Cracking Algorithms

by Patrick Kelley, Saranga Kom, Michelle L. Mazurek, Rich Shay, Tim Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio López - CMU-CYLAB-11-008 , 2011
"... Text-based passwords remain the dominant authentication method in computer systems, despite significant advancement in attackers’ capabilities to perform password cracking. In response to this threat, password composition policies have grown increasingly complex. However, there is insufficient resea ..."
Abstract - Cited by 55 (10 self) - Add to MetaCart
research defining metrics to characterize password strength and evaluating password-composition policies using these metrics. In this paper, we describe an analysis of 12,000 passwords collected under seven composition policies via an online study. We develop an efficient distributed method for calculating

Proactive Password Strength Analyzer Using Filters and Machine Learning Techniques

by Suganya G, Karpgavalli S, Senior Lecturer, Christina V
"... Passwords are ubiquitous authentication methods and they represent the identity of an individual for a system. Users are consistently told that a strong password is essential these days to protect private data. Despite the existence of more secure methods of authenticating users, including smart car ..."
Abstract - Add to MetaCart
vulnerabilities are not exploited. This work proposes a framework to analyze the strength of the password proactively. To analyze the chosen password, filters and support vector machine are employed. This framework can be implemented as a submodule of the access control scheme.

A Novel Approach for Password Strength Analysis through Support Vector Machine

by Jamuna Ks, Karpagavalli S, Vijaya Ms
"... Abstract — Passwords are ubiquitous authentication methods and they represent the identity of an individual for a system. Users are consistently told that a strong password is essential these days to protect private data. Despite the existence of more secure methods of authenticating users, includin ..."
Abstract - Add to MetaCart
vulnerabilities are not exploited. This work employs machine Learning technique to analyze the strength of the password to facilitate organizations launch a multifaceted defense against password breach and provide a highly secure environment. A supervised learning algorithm namely Support Vector Machine is used

Statistical

by Joseph Bonneau
"... metrics for individual password strength ..."
Abstract - Add to MetaCart
metrics for individual password strength

Graphical Passwords: A Survey

by Xiaoyuan Suo, Ying Zhu, G. Scott Owen - In Proceedings of Annual Computer Security Applications Conference , 2005
"... The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to ..."
Abstract - Cited by 107 (0 self) - Add to MetaCart
-based approaches. We discuss the strengths and limitations of each method and point out the future research directions in this area. We also try to answer two important questions: “Are graphical passwords as secure as text-based passwords?”; “What are the major design and implementation issues for graphical

Of Passwords and People: Measuring the Effect of Password-Composition Policies

by Saranga Kom, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman
"... Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to guess, system administrators adopt password-composition policies (e.g., requiring passwords to contain symbols and numbers). ..."
Abstract - Add to MetaCart
). Unfortunately, little is known about the relationship between password-composition policies and the strength of the resulting passwords, or about the behavior of users (e.g., writing down passwords) in response to different policies. We present a large-scale study that investigates password strength, user

The true cost of unusable password policies: password use in the wild.

by Philip Inglesant , M Angela Sasse - Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI 2010), , 2010
"... ABSTRACT HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We present a study which re-examined password policies and password practice in the workplace today. 32 staff member ..."
Abstract - Cited by 55 (8 self) - Add to MetaCart
password policies on maximizing password strength and enforcing frequency alone, policies should be designed using HCI principles to help the user to set an appropriately strong password in a specific context of use.
Next 10 →
Results 1 - 10 of 123
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University