YesPasswords are the most popular and constitute the first line of defence in computer-based security systems; despite the existence of more attack-resistant authentication schemes. In order to enhance password security, it is imperative to strike a balance between having enough rules to maintain good security and not having too many rules that would compel users to take evasive actions which would, in turn, compromise security. It is noted that the human factor is the most critical element in the security system for at least three possible reasons; it is the weakest link, the only factor that exercises initiatives, as well as the factor that transcends all the other elements of the entire system. This illustrates the significanc...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
Passwords have been used for many years in the security of computer systems. The password mechanism ...
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret dat...
To date, system research has focused on designing security mechanisms to protect systems access alth...
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
Security experts frequently refer to people as “the weakest link in the chain” of system security. ...
PhD ThesisThis thesis is concerned with usable security. It describes a series of experiments to un...
Violations of published strictures on password use have led to widespread unauthorized access to com...
Security issues in text-based password authentication are rarely caused by technical issues, but rat...
Security solutions such as passwords are widely used around the world. Choosing a new password is an...
In the past,research on password mechanisms has focussed almost entirely on technical issues. Only ...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
The traditional approach to security has been the use of passwords. They provide the system with a b...
Authentication is an important measure for protecting personal and sensitive information from unauth...
This paper is part of a graduate course titled ???Cryptography and Secure Communications??? from the...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
Passwords have been used for many years in the security of computer systems. The password mechanism ...
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret dat...
To date, system research has focused on designing security mechanisms to protect systems access alth...
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
Security experts frequently refer to people as “the weakest link in the chain” of system security. ...
PhD ThesisThis thesis is concerned with usable security. It describes a series of experiments to un...
Violations of published strictures on password use have led to widespread unauthorized access to com...
Security issues in text-based password authentication are rarely caused by technical issues, but rat...
Security solutions such as passwords are widely used around the world. Choosing a new password is an...
In the past,research on password mechanisms has focussed almost entirely on technical issues. Only ...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
The traditional approach to security has been the use of passwords. They provide the system with a b...
Authentication is an important measure for protecting personal and sensitive information from unauth...
This paper is part of a graduate course titled ???Cryptography and Secure Communications??? from the...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
Passwords have been used for many years in the security of computer systems. The password mechanism ...
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret dat...