A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Encouraging users to improve password security and memorability
2019
International Journal of Information Security
The study also suggests that our password creation methods are much more efficient than strict password policy rules. ...
A study has been conducted to evaluate the efficiency of the proposed password guidelines. ...
has been extensively studied in the past, there are no empirical studies that test the effectiveness of password creation methods. ...
doi:10.1007/s10207-019-00429-y
fatcat:gqwlq6velzaxvj4q6sakw3kzzq
Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study
2021
Security and Communication Networks
In this paper, we present the large-scale empirical study on password-cracking methods proposed by the academic community since 2005, leveraging about 220 million plaintext passwords leaked from 12 popular ...
Then, we perform further evaluation by analyzing the set of cracked passwords in each targeting dataset. ...
Acknowledgments is work was supported in part by National Natural Science Foundation of China (Nos. 61632020, U1936209, 62002353, and U1836207) and Beijing Natural Science Foundation (No. 4192067). ...
doi:10.1155/2021/5563884
doaj:13d5860000674dc89ceb085662db32d4
fatcat:rauwnnaienc6hoxclsgclzmr34
Just What Word Did Mandel'shtam Forget? A Mnemopoetic Solution to the Problem of Saussure's Anagrams
2009
Poetics Today
Both the retrieval of a word on the tip of one's tongue and the (re)construction of an anagram involve sorting through the phonetic and semantic cues that hint at the absent target word. ...
The case study is provided by Osip Mandel'shtam's poem "I have forgotten the word that I wanted to ...
As the term itself implies, this is a field that borders on both poetics and cognitive science (or, more precisely, on the cognitive study of memory): it focuses on the mnemonic aspects of the creation ...
doi:10.1215/03335372-2008-007
fatcat:szydhihvgveblppyjf2c3fp32m
User-generated free-form gestures for authentication
2014
Proceedings of the 12th annual international conference on Mobile systems, applications, and services - MobiSys '14
This paper studies the security and memorability of freeform multitouch gestures for mobile authentication. ...
For example, entropy-based metrics used for text-based passwords are not suitable for capturing the security and memorability of free-form gestures. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. ...
doi:10.1145/2594368.2594375
dblp:conf/mobisys/ShermanCYSMLOR14
fatcat:gbdyr33sifg3toso3vyx226bae
Towards Human Computable Passwords
2017
Innovations in Theoretical Computer Science
As an application, we propose a family of human computable password functions f k1,k2 in which the user needs to perform 2k 1 + 2k 2 + 1 primitive operations (e.g., adding two digits or remembering a secret ...
Thus, our human computable password schemes can maintain strong security guarantees even after an adversary has observed the user login to many different accounts. ...
Figure 5 Table of Mnemonic Helpers to Help Learn Any Secret Mapping
Creating an Account To help the user create an account the computer would first pick a sequence of single-digit challenges C 1 , . ...
doi:10.4230/lipics.itcs.2017.10
dblp:conf/innovations/Blocki0DV17
fatcat:4f57vbaywrd4fniuzb2t4fa2y4
Towards Human Computable Passwords
[article]
2016
arXiv
pre-print
As an application, we propose a family of human computable password functions f_k_1,k_2 in which the user needs to perform 2k_1+2k_2+1 primitive operations (e.g., adding two digits or remembering σ(i)) ...
Thus, our human computable password schemes can maintain strong security guarantees even after an adversary has observed the user login to many different accounts. ...
Spaced repe-
tition and mnemonics enable recall of multiple strong passwords. ...
arXiv:1404.0024v4
fatcat:sc33hbu3dbgirooixleqcyl5xy
Learning and performance with gesture guides
2013
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13
Next, we present two studies that help us better understand the role of visual feedback, finding that it has a dramatic effect on the degree to which gestures are learned. ...
They promise natural and efficient interaction, but suffer from a lack of affordances and thus require learning on the part of the user. ...
EXPERIMENT 1: INFLUENCE OF INSTRUCTION The first experiment was aimed at understanding the influence of an instruction on participants' gesture password creation. ...
doi:10.1145/2470654.2466143
dblp:conf/chi/AndersonB13
fatcat:u53t4gkdxjhyjgppll5v6ykwva
Ethereum: State of Knowledge and Research Perspectives
[chapter]
2018
Lecture Notes in Computer Science
The account state consists of the following fields: nonce -the number of transactions sent by this account (for externally controlled accounts) or the number of contract creations made by this account ...
Ethereum Classic [Eth17c] is an alternative blockchain originating from a controversial Ethereum update. ...
This introduces a new field of study dubbed cryptoeconomics -the study of incentives in cryptographic systems. ...
doi:10.1007/978-3-319-75650-9_14
fatcat:hypwhlvpzndmbllfqxytk4bj4y
From the Quest to Replace Passwords towards Supporting Secure and Usable Password Creation
2021
These include the creation of weak passwords or the reuse of passwords across accounts. ...
Because the security of password authentication largely depends on the password creation and handling of the user, further research was needed to explore measures that support secure and usable password ...
Empirical research found that the strength of random passwords and mnemonics were similar and that both were stronger than user-generated passwords [340] . ...
doi:10.26083/tuprints-00017425
fatcat:cvfuyv6bqndx5pxdmyjivclt2q
Blockchain and Cryptocurrency in Human Computer Interaction: A Systematic Literature Review and Research Agenda
[article]
2022
arXiv
pre-print
We aim to provide an overview of the field, consolidate existing knowledge, and chart paths for future research. ...
Our analysis of 99 articles identifies six major themes: (1) the role of trust, (2) understanding motivation, risk, and perception of cryptocurrencies, (3) cryptocurrency wallets, (4) engaging users with ...
In total 73 (74%) publications contribute either an empirical study that tells us about how people use a system (44 publications) or an empirical study that tells us about people (29 publications). 39 ...
arXiv:2204.10857v1
fatcat:6ugiykjcznfofpseqau7mhfw7a
Bibliography and Glossary
[chapter]
2013
End User Searching in the Health Sciences
In this user-friendly system, DIALOG has retained all of the power and flexibility of its fuH search service, but has simplified commands for the inexperienced end user. ...
The "Online Update" column describes the "basics" of BRS/ AFTER DARK, including menu choices, availability. and cost. ...
For example, TI is a typical mnemonic for the title portion of a record. ...
doi:10.4324/9781315863283-9
fatcat:335p6i7hnjf4vnk6rmetaebct4
The Self-Review Stories Of Seven First-Taker Board Passers In The Philippine Nursing Licensure Examination (P.N.L.E.): A Multiple Case Study
2016
Zenodo
The study closes with a document titled "Marks of a Self-reviewee Board Passer", developed out of the case participants' stories, highlighting their review strategies, practical tips, and lessons learned ...
The self-review stories of these seven board passers (and four additional who answered an email survey questionnaire for triangulation) were analyzed through within and cross case analyses. ...
As could be confirmed by experience and empirical studies, self-confidence is built over time. ...
doi:10.5281/zenodo.159057
fatcat:nm4fvivrtvb55jo2t2j7qrgddi
The brain basis of emotion: A meta-analytic review
2012
Behavioral and Brain Sciences
With a surge of studies in affective neuroscience in recent decades, scientists are poised to answer this question. ...
Instead, we found evidence that is consistent with a psychological constructionist approach to the mind: A set of interacting brain regions commonly involved in basic psychological operations of both an ...
We should continue to use our musical creations to further study ourselves. ...
doi:10.1017/s0140525x11000446
pmid:22617651
pmcid:PMC4329228
fatcat:xvkrwfxuhnhavmxa7bbxwjluqq
Basic Concepts
[chapter]
2011
Oracle Database Performance and Scalability
Each title brings the principles and theory of programming in-the-large and industrial strength software into focus. ...
You will find each publication reinforces the series goal of assisting the reader with producing useful, well-engineered software systems. ...
After you change the password of such an account, your application may stop working. ...
doi:10.1002/9781118135532.ch1
fatcat:itsggugltfdqvis5qndwmthbku
IRRODL Volume 5, Number 1
2004
International Review of Research in Open and Distance Learning
Further evaluation of the contribution of wikis for developing communities of practice in DE education is warranted. ...
Columbia Institute of Technology. ...
The password-protected course materials can be created outside the IntraLearn platform and uploaded to the server; or an inline editor can be used for direct content creation. ...
doi:10.19173/irrodl.v5i1.1087
fatcat:tlkugzw6ynhmxgyae5wpjhfwb4
« Previous
Showing results 1 — 15 out of 115 results