Filters








115 Hits in 5.3 sec

Encouraging users to improve password security and memorability

M. Yıldırım, I. Mackie
2019 International Journal of Information Security  
The study also suggests that our password creation methods are much more efficient than strict password policy rules.  ...  A study has been conducted to evaluate the efficiency of the proposed password guidelines.  ...  has been extensively studied in the past, there are no empirical studies that test the effectiveness of password creation methods.  ... 
doi:10.1007/s10207-019-00429-y fatcat:gqwlq6velzaxvj4q6sakw3kzzq

Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study

Ruixin Shi, Yongbin Zhou, Yong Li, Weili Han
2021 Security and Communication Networks  
In this paper, we present the large-scale empirical study on password-cracking methods proposed by the academic community since 2005, leveraging about 220 million plaintext passwords leaked from 12 popular  ...  Then, we perform further evaluation by analyzing the set of cracked passwords in each targeting dataset.  ...  Acknowledgments is work was supported in part by National Natural Science Foundation of China (Nos. 61632020, U1936209, 62002353, and U1836207) and Beijing Natural Science Foundation (No. 4192067).  ... 
doi:10.1155/2021/5563884 doaj:13d5860000674dc89ceb085662db32d4 fatcat:rauwnnaienc6hoxclsgclzmr34

Just What Word Did Mandel'shtam Forget? A Mnemopoetic Solution to the Problem of Saussure's Anagrams

M. Gronas
2009 Poetics Today  
Both the retrieval of a word on the tip of one's tongue and the (re)construction of an anagram involve sorting through the phonetic and semantic cues that hint at the absent target word.  ...  The case study is provided by Osip Mandel'shtam's poem "I have forgotten the word that I wanted to  ...  As the term itself implies, this is a field that borders on both poetics and cognitive science (or, more precisely, on the cognitive study of memory): it focuses on the mnemonic aspects of the creation  ... 
doi:10.1215/03335372-2008-007 fatcat:szydhihvgveblppyjf2c3fp32m

User-generated free-form gestures for authentication

Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, Teemu Roos
2014 Proceedings of the 12th annual international conference on Mobile systems, applications, and services - MobiSys '14  
This paper studies the security and memorability of freeform multitouch gestures for mobile authentication.  ...  For example, entropy-based metrics used for text-based passwords are not suitable for capturing the security and memorability of free-form gestures.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/2594368.2594375 dblp:conf/mobisys/ShermanCYSMLOR14 fatcat:gbdyr33sifg3toso3vyx226bae

Towards Human Computable Passwords

Jeremiah Blocki, Manuel Blum, Anupam Datta, Santosh Vempala, Marc Herbstritt
2017 Innovations in Theoretical Computer Science  
As an application, we propose a family of human computable password functions f k1,k2 in which the user needs to perform 2k 1 + 2k 2 + 1 primitive operations (e.g., adding two digits or remembering a secret  ...  Thus, our human computable password schemes can maintain strong security guarantees even after an adversary has observed the user login to many different accounts.  ...  Figure 5 Table of Mnemonic Helpers to Help Learn Any Secret Mapping Creating an Account To help the user create an account the computer would first pick a sequence of single-digit challenges C 1 , .  ... 
doi:10.4230/lipics.itcs.2017.10 dblp:conf/innovations/Blocki0DV17 fatcat:4f57vbaywrd4fniuzb2t4fa2y4

Towards Human Computable Passwords [article]

Jeremiah Blocki and Manuel Blum and Anupam Datta and Santosh Vempala
2016 arXiv   pre-print
As an application, we propose a family of human computable password functions f_k_1,k_2 in which the user needs to perform 2k_1+2k_2+1 primitive operations (e.g., adding two digits or remembering σ(i))  ...  Thus, our human computable password schemes can maintain strong security guarantees even after an adversary has observed the user login to many different accounts.  ...  Spaced repe- tition and mnemonics enable recall of multiple strong passwords.  ... 
arXiv:1404.0024v4 fatcat:sc33hbu3dbgirooixleqcyl5xy

Learning and performance with gesture guides

Fraser Anderson, Walter F. Bischof
2013 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13  
Next, we present two studies that help us better understand the role of visual feedback, finding that it has a dramatic effect on the degree to which gestures are learned.  ...  They promise natural and efficient interaction, but suffer from a lack of affordances and thus require learning on the part of the user.  ...  EXPERIMENT 1: INFLUENCE OF INSTRUCTION The first experiment was aimed at understanding the influence of an instruction on participants' gesture password creation.  ... 
doi:10.1145/2470654.2466143 dblp:conf/chi/AndersonB13 fatcat:u53t4gkdxjhyjgppll5v6ykwva

Ethereum: State of Knowledge and Research Perspectives [chapter]

Sergei Tikhomirov
2018 Lecture Notes in Computer Science  
The account state consists of the following fields: nonce -the number of transactions sent by this account (for externally controlled accounts) or the number of contract creations made by this account  ...  Ethereum Classic [Eth17c] is an alternative blockchain originating from a controversial Ethereum update.  ...  This introduces a new field of study dubbed cryptoeconomics -the study of incentives in cryptographic systems.  ... 
doi:10.1007/978-3-319-75650-9_14 fatcat:hypwhlvpzndmbllfqxytk4bj4y

From the Quest to Replace Passwords towards Supporting Secure and Usable Password Creation

Verena Zimmermann
2021
These include the creation of weak passwords or the reuse of passwords across accounts.  ...  Because the security of password authentication largely depends on the password creation and handling of the user, further research was needed to explore measures that support secure and usable password  ...  Empirical research found that the strength of random passwords and mnemonics were similar and that both were stronger than user-generated passwords [340] .  ... 
doi:10.26083/tuprints-00017425 fatcat:cvfuyv6bqndx5pxdmyjivclt2q

Blockchain and Cryptocurrency in Human Computer Interaction: A Systematic Literature Review and Research Agenda [article]

Michael Fröhlich, Franz Waltenberger, Ludwig Trotter, Florian Alt, Albrecht Schmidt
2022 arXiv   pre-print
We aim to provide an overview of the field, consolidate existing knowledge, and chart paths for future research.  ...  Our analysis of 99 articles identifies six major themes: (1) the role of trust, (2) understanding motivation, risk, and perception of cryptocurrencies, (3) cryptocurrency wallets, (4) engaging users with  ...  In total 73 (74%) publications contribute either an empirical study that tells us about how people use a system (44 publications) or an empirical study that tells us about people (29 publications). 39  ... 
arXiv:2204.10857v1 fatcat:6ugiykjcznfofpseqau7mhfw7a

Bibliography and Glossary [chapter]

2013 End User Searching in the Health Sciences  
In this user-friendly system, DIALOG has retained all of the power and flexibility of its fuH search service, but has simplified commands for the inexperienced end user.  ...  The "Online Update" column describes the "basics" of BRS/ AFTER DARK, including menu choices, availability. and cost.  ...  For example, TI is a typical mnemonic for the title portion of a record.  ... 
doi:10.4324/9781315863283-9 fatcat:335p6i7hnjf4vnk6rmetaebct4

The Self-Review Stories Of Seven First-Taker Board Passers In The Philippine Nursing Licensure Examination (P.N.L.E.): A Multiple Case Study

Nerison M. Ocampo, Gerardo L. Ed.D. Guiuan
2016 Zenodo  
The study closes with a document titled "Marks of a Self-reviewee Board Passer", developed out of the case participants' stories, highlighting their review strategies, practical tips, and lessons learned  ...  The self-review stories of these seven board passers (and four additional who answered an email survey questionnaire for triangulation) were analyzed through within and cross case analyses.  ...  As could be confirmed by experience and empirical studies, self-confidence is built over time.  ... 
doi:10.5281/zenodo.159057 fatcat:nm4fvivrtvb55jo2t2j7qrgddi

The brain basis of emotion: A meta-analytic review

Kristen A. Lindquist, Tor D. Wager, Hedy Kober, Eliza Bliss-Moreau, Lisa Feldman Barrett
2012 Behavioral and Brain Sciences  
With a surge of studies in affective neuroscience in recent decades, scientists are poised to answer this question.  ...  Instead, we found evidence that is consistent with a psychological constructionist approach to the mind: A set of interacting brain regions commonly involved in basic psychological operations of both an  ...  We should continue to use our musical creations to further study ourselves.  ... 
doi:10.1017/s0140525x11000446 pmid:22617651 pmcid:PMC4329228 fatcat:xvkrwfxuhnhavmxa7bbxwjluqq

Basic Concepts [chapter]

2011 Oracle Database Performance and Scalability  
Each title brings the principles and theory of programming in-the-large and industrial strength software into focus.  ...  You will find each publication reinforces the series goal of assisting the reader with producing useful, well-engineered software systems.  ...  After you change the password of such an account, your application may stop working.  ... 
doi:10.1002/9781118135532.ch1 fatcat:itsggugltfdqvis5qndwmthbku

IRRODL Volume 5, Number 1

Various Authors
2004 International Review of Research in Open and Distance Learning  
Further evaluation of the contribution of wikis for developing communities of practice in DE education is warranted.  ...  Columbia Institute of Technology.  ...  The password-protected course materials can be created outside the IntraLearn platform and uploaded to the server; or an inline editor can be used for direct content creation.  ... 
doi:10.19173/irrodl.v5i1.1087 fatcat:tlkugzw6ynhmxgyae5wpjhfwb4
« Previous Showing results 1 — 15 out of 115 results