Sciweavers

920 search results - page 4 / 184
» Selecting Secure Passwords
Sort
View
ESORICS
2007
Springer
15 years 3 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
INFOCOM
2010
IEEE
14 years 8 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
70
Voted
CRYPTO
2001
Springer
136views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Session-Key Generation Using Human Passwords Only
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilis...
Oded Goldreich, Yehuda Lindell
MCETECH
2009
Springer
15 years 4 months ago
TwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
Paul C. van Oorschot, Tao Wan
87
Voted
ACSAC
2008
IEEE
14 years 9 months ago
YAGP: Yet Another Graphical Password Strategy
Alphanumeric passwords are widely used in computer and network authentication to protect users' privacy. However, it is well known that long, textbased passwords are hard for...
Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wan...