Password restriction policies and advice on creating secure passwords have limited effects on password strength. Influencing users to create more secure passwords remains an open problem. We have developed Persuasive Text Passwords (PTP), a text password creation system which leverages Persuasive Technology principles to influence users in creating more secure passwords without sacrificing usability. After users choose a password during creation, PTP improves its security by placing randomly-chosen characters at random positions into the password. Users may shuffle to be presented with randomly-chosen and positioned characters until they find a combination they feel is memorable. In this paper, we present an 83-participant user study testin...
Users often make passwords that are easy for attackers to guess. Prior studies have documented featu...
AbstractText based passwords are the most widely used authentication mechanism in multiuser environm...
As more services and workflows are moved into computerized systems the number of accounts a person h...
Text passwords are the ubiquitous method of authentication, used by most people for most online serv...
Text passwords are the primary authentication method used for most online services. Many online user...
Security issues in text-based password authentication are rarely caused by technical issues, but rat...
Users tend to form their own mental models of good passwords regardless of any instructions provided...
Many Internet applications, for example e-commerce or email services require that users create a use...
This doctoral research aims to persuade users to choose and remember more secure text passwords. The...
System-generated random passwords have maximum pass- word security and are highly resistant to guess...
System-generated random passwords have maximum pass- word security and are highly resistant to guess...
Persuading people to choose strong passwords is challenging. One way to influence password strength,...
Persuading people to choose strong passwords is challenging. One way to influence password strength,...
Users often make passwords that are easy for attackers to guess. Prior studies have documented featu...
Usable security has unique usability challenges because the need for security often means that stand...
Users often make passwords that are easy for attackers to guess. Prior studies have documented featu...
AbstractText based passwords are the most widely used authentication mechanism in multiuser environm...
As more services and workflows are moved into computerized systems the number of accounts a person h...
Text passwords are the ubiquitous method of authentication, used by most people for most online serv...
Text passwords are the primary authentication method used for most online services. Many online user...
Security issues in text-based password authentication are rarely caused by technical issues, but rat...
Users tend to form their own mental models of good passwords regardless of any instructions provided...
Many Internet applications, for example e-commerce or email services require that users create a use...
This doctoral research aims to persuade users to choose and remember more secure text passwords. The...
System-generated random passwords have maximum pass- word security and are highly resistant to guess...
System-generated random passwords have maximum pass- word security and are highly resistant to guess...
Persuading people to choose strong passwords is challenging. One way to influence password strength,...
Persuading people to choose strong passwords is challenging. One way to influence password strength,...
Users often make passwords that are easy for attackers to guess. Prior studies have documented featu...
Usable security has unique usability challenges because the need for security often means that stand...
Users often make passwords that are easy for attackers to guess. Prior studies have documented featu...
AbstractText based passwords are the most widely used authentication mechanism in multiuser environm...
As more services and workflows are moved into computerized systems the number of accounts a person h...