People tend to choose predictable passwords which are vulnerable to guessing attacks. To combat the security issue, system-assigned authentication keys were proposed, but coming at a cost to memorability. In this thesis, I explore two different approaches to improve memorability of system-assigned keys through implicit learning: one that directly uses implicit memory alone, and another that indirectly uses implicit memory to reinforce explicit memory. I first explore the feasibility of direct implicit learning-based authentication secrets, Tacit Secrets: system-assigned passwords that you can remember, but cannot write down or otherwise communicate. I design an approach to creating Tacit Secrets based on Contextual Cueing, an implicit lea...
In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and rei...
Although the use of multiple methods of user authentication for IT system increases security, passwo...
Abstract—Users often choose passwords that are easy to remember but also easy to guess by attackers....
User-chosen passwords reflecting common strategies and patterns ease memorization but offer uncertai...
Overcoming the threat of coercion attacks in a cryptographic system has been a top priority for syst...
The quest (search) for a reliable and convenient security system to authenticate a computer user has...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
International audienceSelecting and remembering secure passwords puts a high cognitive burdenon the ...
This doctoral research aims to persuade users to choose and remember more secure text passwords. The...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
Smartphones contain a wealth of personal and corporate data. Several surveys have reported that abou...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Text-based secrets are still the most commonly used authentication mechanism in information systems....
In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and rei...
Although the use of multiple methods of user authentication for IT system increases security, passwo...
Abstract—Users often choose passwords that are easy to remember but also easy to guess by attackers....
User-chosen passwords reflecting common strategies and patterns ease memorization but offer uncertai...
Overcoming the threat of coercion attacks in a cryptographic system has been a top priority for syst...
The quest (search) for a reliable and convenient security system to authenticate a computer user has...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
International audienceSelecting and remembering secure passwords puts a high cognitive burdenon the ...
This doctoral research aims to persuade users to choose and remember more secure text passwords. The...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
Smartphones contain a wealth of personal and corporate data. Several surveys have reported that abou...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Text-based secrets are still the most commonly used authentication mechanism in information systems....
In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and rei...
Although the use of multiple methods of user authentication for IT system increases security, passwo...
Abstract—Users often choose passwords that are easy to remember but also easy to guess by attackers....