13,196 Hits in 13.8 sec

Putting It All Together [chapter]

Robert A. Young
2012 Stewardship of the Built Environment  
Think about those people, and whether or not they would have to time to join the work group.  ...  We are ready to assign the work group. The criteria for choosing the work group are people who:  will do what they promise to do.  ...  What activities/ information does the association provide its membership? What style of projects do the students work on? What is the average size of company? How many companies?  ... 
doi:10.5822/978-1-61091-236-5_5 fatcat:iub3uduv6zg5hevi6paz7s6a2a

A Password Manager that Doesn't Remember Passwords

Elizabeth Stobert, Robert Biddle
2014 Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14  
Password managers and cued graphical passwords are two password solutions that address the issues of memorability and keeping track of of passwords.  ...  We have developed Versipass, a password manager that incorporates key elements of password managers and cued graphical passwords to avoid existing problems of password memorability and associating passwords  ...  ACKNOWLEDGMENTS We would like to thank the Government of Canada for support from NSERC ISSNet and the GRAND NCE, as well as support from an NSERC Canada Graduate Scholarship, and an NSERC Discovery Grant  ... 
doi:10.1145/2683467.2683471 dblp:conf/nspw/StobertB14 fatcat:up7iuifd6zefjnbeokurgc2lxy

That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers [article]

Sean Oesch, Scott Ruoti
2019 arXiv   pre-print
Password managers have the potential to help users more effectively manage their passwords and address many of the concerns surrounding password-based authentication, however prior research has identified  ...  To answer this question, we evaluate thirteen popular password managers and consider all three stages of the password manager lifecycle--password generation, storage, and autofill.  ...  Acknowledgments The authors would like the thank their shepherd Ben Stock and the anonymous reviewers for their helpful feedback.  ... 
arXiv:1908.03296v2 fatcat:fdzf3tu7fret3f3h5pri7m35we

Rehabilitation Living Lab in the Mall Community of Practice: Learning Together to Improve Rehabilitation, Participation and Social Inclusion for People Living with Disabilities

Barbara Mazer, Dahlia Kairy, Andréanne Guindon, Michel Girard, Bonnie Swaine, Eva Kehayia, Delphine Labbé
2015 International Journal of Environmental Research and Public Health  
Communities of practice (CoP) can facilitate collaboration between people who share a common interest, but do not usually work together. A CoP was initiated and OPEN ACCESS Int. J. Environ. Res.  ...  This study aimed to evaluate the structure, process and outcomes of this CoP.  ...  Eva Kehayia, Bonnie Swaine and Delphine Labbé contributed to the development of the CoP within the RehabMaLL, as well as the interpretation of the results and manuscript revisions.  ... 
doi:10.3390/ijerph120404439 pmid:25913187 pmcid:PMC4410257 fatcat:h2e72q5c7ng2jlpwcrgg6on2ju

Fluid Passwords - Mitigating the effects of password leaks at the user level [article]

Michael Farcasin, Akhileshwar Guli, Eric Chan-Tin
2017 arXiv   pre-print
We implemented our algorithm as a Firefox add-on that automatically resets a user's password when they log in to their account, and stores the new password in the built-in Firefox password manager.  ...  However, the adverse effects of a password breach can be mitigated by changing users' passwords.  ...  Last, since the goal of Fluid Passwords is to provide better usability and security, a user study would confirm our tool is user-friendly and non-intrusive, but we expect that to be the case due to the  ... 
arXiv:1708.09333v1 fatcat:s2iasuvwdrekfi32ws6bmehi7m

Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers [chapter]

Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser
2015 Lecture Notes in Computer Science  
As a result, password managers are unnecessarily complex and yet they still occasionally fail to work properly on some websites.  ...  Subtle and sometimes baffling variations in the implementation of password-based authentication are widespread on the web.  ...  Acknowledgements We gratefully acknowledge the European Research Council for funding this research under grant 307224 (Pico).  ... 
doi:10.1007/978-3-319-24192-0_4 fatcat:bslw6plqbzayzawldblze2co7e

Preventing alcohol misuse in young people: an exploratory cluster randomised controlled trial of the Kids, Adults Together (KAT) programme

Jeremy Segrott, Heather Rothwell, Gillian Hewitt, Rebecca Playle, Chao Huang, Simon Murphy, Laurence Moore, Matthew Hickman, Hayley Reed
2015 Public Health Research  
There are doubts/uncertainties about the potential effects of KAT; suitability of measures; the large number of schools which would be required for an effectiveness trial of KAT, and the cost of this;  ...  The work was undertaken with the support of The Centre for the Development and Evaluation of Complex Interventions for Public Health Improvement (DECIPHer), a UK Clinical Research Collaboration Public  ...  We would like you to do just what you would normally do in class or at the fun evening and we will try not to get in the way.  ... 
doi:10.3310/phr03150 fatcat:lcjnqcdw2vh6vihm243dymrxgy

Pico Without Public Keys [chapter]

Frank Stajano, Bruce Christianson, Mark Lomas, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser
2015 Lecture Notes in Computer Science  
What would happen to Pico if success of the mythical quantum computer meant secure public key primitives were no longer available, or if for other reasons such as energy consumption we preferred not to  ...  We also note that the current prototype of Pico, when working in compatibility mode through the Pico Lens (i.e. with websites that are unaware of the Pico protocols), doesn't actually use public key cryptography  ...  Acknowledgements We thank Ross Anderson, Bruno Crispo, Michael Roe and Alf Zugenmaier for their comments on the history of the public key vs symmetric key user authentication debate.  ... 
doi:10.1007/978-3-319-26096-9_21 fatcat:ewasulxynbfgdp7nccaolli5fe

The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android [article]

Sean Oesch, Anuj Gautam, Scott Ruoti
2021 arXiv   pre-print
Our results find that while the frameworks address several common issues (e.g., requiring user interaction before autofill), they also enforce insecure behavior and fail to provide the password managers  ...  In this paper, we conduct the first holistic security evaluation of such frameworks on iOS and Android, examining whether they achieve substantive benefits over the ad-hoc desktop environment or become  ...  While browsers do provide a platform to deploy password manager extensions, they do not actually provide any password management-centric functionality-i.e., they do not assist with the detection of login  ... 
arXiv:2104.10017v1 fatcat:ybleyhaiwbchxoyyektybvjz4e

Studying the Impact of Managers on Password Strength and Reuse [article]

Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Sven Bugiel, Michael Backes
2017 arXiv   pre-print
In contrast to prior work, we collect the passwords' entry methods (e.g., human or password manager) in addition to the passwords and their metrics.  ...  To remedy the situation, end-users are very often referred to password managers as a solution to the password reuse and password weakness problems.  ...  If hackers hack just my browser they would have a bunch of passwords.  ... 
arXiv:1712.08940v1 fatcat:sythuuftirbxdfts5jxscvnlli


James Nicholson, Jill McGlasson
2020 Companion Publication of the 2020 ACM on Designing Interactive Systems Conference  
We describe the CyberGuardians initiative where we train older members of the community to be knowledgeable about cybersecurity so they can spread the information to peers and help protect their communities  ...  Specifically, we focus on a case study evaluating two CyberGuardians and their use of training materials to inform peers in their community about cybersecurity.  ...  Initially, both Jane and Joe were unsure about attending the CyberGuardians training, but decided that they would attend together in order to "find out how to better protect [themselves] online".  ... 
doi:10.1145/3393914.3395871 dblp:conf/ACMdis/NicholsonM20 fatcat:dhzkq7obuffv7ejbn7hr3loata

A Spark is Enough in a Straw World: a Study of Websites Password Management in the Wild [article]

Simone Raponi, Roberto Di Pietro
2018 arXiv   pre-print
Indeed, if a website adopts a poor password management system, this choice makes useless even the most robust password chosen by its users.  ...  Then, we provide a thorough analysis of the password management of some of the Alexa's top 200 websites in different countries, including England, France, Germany, Spain and Italy.  ...  Results are striking; of the 174 analyzed websites (see Table 3 ) almost 25% of the websites do have from poor to very poor password management, and an overall of 43.68% are vulnerable to at least one  ... 
arXiv:1804.07016v3 fatcat:borojc43xbg3nmj5qty4zubohe

Strengthening user authentication through opportunistic cryptographic identity assertions

Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan Wallach, Dirk Balfanz
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
The most ubiquitous method -the password -has numerous problems, including susceptibility to unintentional exposure via phishing and cross-site password reuse.  ...  ., a phone) can communicate directly with the user's computer (and hence the remote web server) without any interaction with the user.  ...  We would also like to thank the anonymous reviewers of our manuscript for helping us make this a better paper.  ... 
doi:10.1145/2382196.2382240 dblp:conf/ccs/CzeskisDKWB12 fatcat:vi5raid3wve33kbm4v5cof64sq

Reconciling Usability and Security: Interaction Design Guidance and Practices for On-Line User Authentication [chapter]

Michael Lang
2011 Information Systems Development  
This paper reviews the sources of literature on interactive design guidance for on-line user authentication, and then compares the actual practices of a purposefully selected sample of twelve Websites  ...  Usability and security are often portrayed as though they are competing priorities in information systems development.  ...  A better resolution to the problem of a user having multiple Websites with the same UserID and password is to permit users to register using a "unified" service such as Windows CardSpace, SAML or OpenID  ... 
doi:10.1007/978-1-4419-9790-6_32 dblp:conf/isdevel/Lang10 fatcat:bz3ukbs7onfdzcoekqhhrhaiou

Human-centered authentication guidelines

Jeremiah D. Still, Ashley Cain, David Schuster, Steven Furnell, Steven Furnell
2017 Information and Computer Security  
If they do not, the implementation has a high probability of failure.  ...  Users may hold mental models of the working of the Internet, the navigational structure of a website, and the relationship among products when shopping.  ... 
doi:10.1108/ics-04-2016-0034 fatcat:hn56qksx7be2pdxzrk57j7hnyq
« Previous Showing results 1 — 15 out of 13,196 results