The goal of this thesis is to study the implementation of a passphrase system that implements new creation policies, called StoryPass. We are motivated to do this research as current text-based authentication methods, such as the password, fail to provide adequate security and usability. We call our system StoryPass because we were inspired by previous research which states that information created with stories can be more memorable. The problem we address is the lack of research on secure and usable passphrase creation guidelines. Our main contributions include a theoretical security analysis, a controlled 39-day user study and an estimate of the security that the resulting passphrases provide. Our security estimates are mainly performed t...
International audienceToday, children, the so-called digital natives, are growing up at ease with di...
Despite considerable research on passwords, empirical studies of password strength have been limited...
Passwords are the most common authentication mechanism that defenses against unauthorized access to ...
Although the use of multiple methods of user authentication for IT system increases security, passwo...
International audiencePassphrases have many uses, such as serving as seeds for passwords. User-creat...
The combination of user-names and passwords has become the predominant method of user authentication...
Users tend to create passwords that are easy to guess, while system-assigned passwords tend to be ha...
This paper explores alternatives to traditional alphanumeric passwords. Users are asked to remember ...
Research on more than 100 million passwords that have been leaked to the public domain has uncovered...
Text-based secrets are still the most commonly used authentication mechanism in information systems....
A Project Submitted to the School of Science and Technology in Partial Fulfillment of the Requiremen...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
In this paper we propose that what-you-know authentication schemes be built using narrative elements...
As more services and workflows are moved into computerized systems the number of accounts a person h...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
International audienceToday, children, the so-called digital natives, are growing up at ease with di...
Despite considerable research on passwords, empirical studies of password strength have been limited...
Passwords are the most common authentication mechanism that defenses against unauthorized access to ...
Although the use of multiple methods of user authentication for IT system increases security, passwo...
International audiencePassphrases have many uses, such as serving as seeds for passwords. User-creat...
The combination of user-names and passwords has become the predominant method of user authentication...
Users tend to create passwords that are easy to guess, while system-assigned passwords tend to be ha...
This paper explores alternatives to traditional alphanumeric passwords. Users are asked to remember ...
Research on more than 100 million passwords that have been leaked to the public domain has uncovered...
Text-based secrets are still the most commonly used authentication mechanism in information systems....
A Project Submitted to the School of Science and Technology in Partial Fulfillment of the Requiremen...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
In this paper we propose that what-you-know authentication schemes be built using narrative elements...
As more services and workflows are moved into computerized systems the number of accounts a person h...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
International audienceToday, children, the so-called digital natives, are growing up at ease with di...
Despite considerable research on passwords, empirical studies of password strength have been limited...
Passwords are the most common authentication mechanism that defenses against unauthorized access to ...