A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Online Privacy and Security - Part 2: Encrypted Devices and Account Security
[article]
2018
Figshare
This presentation covers how to generate and manage good passwords, use two-factor authentication, and encrypt devices. The concept and use of TOR is also included at the end. ...
manager
-Can also store notes
-Only need to know one
password
• Password generator
• Highly resistant to brute
force attacks
• Firefox plugins
• Good Android apps
• No online service ...
• Need programs to generate passwords • Reused passwords are non-random • l33t and personal data are not random Traditional Password • Lots of entropy in little space -Good for online accounts • Length ...
doi:10.6084/m9.figshare.6963038
fatcat:sbnbt4vwvbdnxnqpgaugni5e5a
Password Managers—It's All about Trust and Transparency
2020
Future Internet
Password managers appear to be a promising solution to help people handle their passwords. ...
A password is considered to be the first line of defence in protecting online accounts, but there are problems when people handle their own passwords, for example, password reuse and difficult to memorize ...
Acknowledgments: The authors would like to thank the 30 participants who took part in the usability test and interview study, as well as the 247 anonymous participants who completed the online questionnaire ...
doi:10.3390/fi12110189
fatcat:h2hkg6npyfgezhb3qct6k5vtxa
Dual Layer Secured Password Manager using Blowfish and LSB
2016
International Journal of Computer Applications
In this paper, a Password Manager, an Android Application is proposed. ...
A typical password manager uses database to store all login credentials but our proposed approach replaces database with image and stores all login credentials inside an image and in turn providing dual ...
The best approach is to use a password manager to store strong passwords for each application. ...
doi:10.5120/ijca2016910048
fatcat:wzv2o2crjzfuhiivu526h665zu
Anti Screenshot, Shoulder Surfing Resistant Virtual Keypad for Online Platform
2017
International Journal of Recent Trends in Engineering and Research
In this paper, a secured virtual keyboard scheme that withstands such attacks is proposed. ...
Today the prevalence of online banking is enormous. People prefer to accomplish their financial transactions through the online banking services offered by their banks. ...
In this idea, the keys on a particular row keyboard before they are hidden. ...
doi:10.23883/ijrter.2017.3174.xzn7n
fatcat:toapkayrw5brtgpxpczxsfcc4m
Forensically-Sound Analysis of Security Risks of Using Local Password Managers
2016
2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)
As a consequence, an attacker or a malware with access to the computer on which the password managers were running may be able to steal sensitive information, even though these password managers are meant ...
Taking a systematic forensic analysis approach, this paper reports on a case study of three popular local password managers: KeePass (v2.28), Password Safe (v3.35.1) and RoboForm (v7.9.12). ...
INTRODUCTION Passwords are essential for those with an online presence. ...
doi:10.1109/rew.2016.034
dblp:conf/re/GrayFY16
fatcat:hhnllkgnlne3zkijjxstcqi6ca
Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning
[article]
2020
arXiv
pre-print
By designing a simulated cyberspace experimental environment to verify our method. Our objective is to find more hidden attack paths, to analysis the weakness of cyberspace configuration. ...
In particular, as we train over a greater number of agents as attackers, our method becomes better at rapidly finding attack paths for previously hidden paths, especially in multiple domain cyberspace. ...
the management service of T2, that is T2 manager; Third, get the password FW2 password of firewall FW2 stored on T2 and the password S1 web password of service S1 web through T2 manager; Fourth, use T2 ...
arXiv:2007.04614v1
fatcat:xvhpozaiejeqddbtqfhx4djdcq
Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers
[chapter]
2015
Lecture Notes in Computer Science
As a result, password managers are unnecessarily complex and yet they still occasionally fail to work properly on some websites. ...
These semantic labels allow a software agent such as a password manager to extract meaning, such as which site the login form is for and what field in the form corresponds to the username. ...
signed-in to their online accounts. ...
doi:10.1007/978-3-319-24192-0_4
fatcat:bslw6plqbzayzawldblze2co7e
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?
2018
EAI Endorsed Transactions on Security and Safety
The passwords were selected based on a survey of over 100 human password experts. ...
The results revealed that participants exhibited four distinct behavioral patterns when the passwords were hidden, and many changed their behaviors significantly after the passwords were disclosed, suggesting ...
She could not be listed as a co-author because the other co-authors lost contact with her since she left the University of Surrey. ...
doi:10.4108/eai.13-7-2018.162797
fatcat:fclxyryhzvfsrnwo6d5xycr2je
Kamouflage: Loss-Resistant Password Management
[chapter]
2010
Lecture Notes in Computer Science
An attacker who steals a laptop or cell phone with a Kamouflage-based password manager is forced to carry out a considerable amount of online work before obtaining any user credentials. ...
We introduce Kamouflage: a new architecture for building theft-resistant password managers. ...
Introduction All modern web browsers ship with a built-in password manager to help users manage the multitude of passwords needed for logging into online accounts. ...
doi:10.1007/978-3-642-15497-3_18
fatcat:nekiyufzljh75hxcfvrfpbrcma
Revisiting password rules: facilitating human management of passwords
2016
2016 APWG Symposium on Electronic Crime Research (eCrime)
Recent work in computer security challenges the conventional wisdom of expert password advice, such as change your passwords often, do not reuse your passwords, or do not write your passwords down. ...
Password rules were established in the context of past security concerns. ...
Updated R6 -Keep-written-down-passwordshidden: Store written-down passwords or password hints in a secure place hidden from view. ...
doi:10.1109/ecrime.2016.7487945
dblp:conf/ecrime/Zhang-KennedyCO16
fatcat:7ikxxwlwx5cijjnc34gxkho46e
Secure authentication using dynamic virtual keyboard layout
2011
Proceedings of the International Conference & Workshop on Emerging Trends in Technology - ICWET '11
All users who were told to spoof the Web-Based services, Business and Information Management.
password could match only 33-67 per cent of the password Pages: 173 - ...
A
and password to the server for authentication. ...
doi:10.1145/1980022.1980087
dblp:conf/icwet/AgarwalMPS11
fatcat:x2zu6c72tjbnbjct67reyhprqy
How to Set and Manage Your Network Password: A Multidimensional Scheme of Password Reuse
[chapter]
2014
IFIP Advances in Information and Communication Technology
in detail, and thus designed a multidimensional password scheme that infused into the information dimensions and classified management. ...
Based on the data of Internet password leak door at the end of 2011 as well as the college students' online survey, the paper analyzed the structural characteristics and reuse behavior of netizen passwords ...
for classified management. ...
doi:10.1007/978-3-662-45526-5_25
fatcat:klxjxco4h5g7zc2s33dwagcbwy
Online Banking System using Mobile-OTP with QR-code
2017
IJARCCE
QR Code is versatile and is used in various fields such as online banking, managing attendance, help visually impaired people, security applications such as different kinds of cryptography and steganography ...
However, the existing internet banking system was exposed to the danger of hacking method such as Phishing or Pharming beyond snatching a user"s ID and Password. ...
To overcome from this problem we are implementing online banking transaction by using OTP which is hidden inside a QR code. ...
doi:10.17148/ijarcce.2017.64125
fatcat:4x4irhla4vh6bilecp2bhnjlfy
URL Analysis and Cross Site Scripting with Secured Authentication Protocol System in Financial Services
2012
International Journal of Security Privacy and Trust Management
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval ...
ACKNOWLEDGEMENTS This paper is part of SSE Project funded through a National Technical Research Organization, New Delhi and is gratefully acknowledged. ...
In this online user authentication process a malicious user cannot attain the end-user password from the network plane. ...
doi:10.5121/ijsptm.2012.1301
fatcat:6245nwpp75e6tj33l7tasfxecq
Protected Web Components: Hiding Sensitive Information in the Shadows
2015
IT Professional Magazine
Protected Web components can keep private data safe from opportunistic attacks by hiding static data in the Document Object Model (DOM) and isolating sensitive interactive elements within a Web component ...
For seven online password managers, gathered from the top 20 results for the Google query "free online password manager," we investigated whether they include scripts from a third-party on the page that ...
Password managers. Online password managers are used to store the multitude of authentication credentials required on the modern Web. ...
doi:10.1109/mitp.2015.12
fatcat:zx7li3ilsvc7bgtkzbclx6hxqu
« Previous
Showing results 1 — 15 out of 11,995 results