Text-based secrets are still the most commonly used authentication mechanism in information systems. Initially introduced as more secure authentication keys that people could recall, passphrases are tokens consisting of multiple words. However, when left to the choice of users, they tend to choose predictable natural language patterns in passphrases, resulting in vulnerability to guessing attacks. System-assigned authentication keys can be guaranteed to be secure, but this comes at a cost to memorability. In this study we investigate the memorability of system-assigned passphrases from a familiar vocabulary to the user. The passphrases are generated with the Generative Pre-trained Transformer 2 (GPT-2) model trained on the familiar vocabula...
Despite considerable research on passwords, empirical studies of password strength have been limited...
As more services and workflows are moved into computerized systems the number of accounts a person h...
Recently, there has been research on what factors influence a user’s password setting practices, whi...
Users tend to create passwords that are easy to guess, while system-assigned passwords tend to be ha...
International audiencePassphrases have many uses, such as serving as seeds for passwords. User-creat...
The goal of this thesis is to study the implementation of a passphrase system that implements new cr...
The combination of user-names and passwords has become the predominant method of user authentication...
Although the use of multiple methods of user authentication for IT system increases security, passwo...
Passwords are still the most used authentication mechanism for wide spectrum of use cases. Memorabil...
People tend to choose predictable passwords which are vulnerable to guessing attacks. To combat the ...
Research on more than 100 million passwords that have been leaked to the public domain has uncovered...
Textual passwords are often the only mechanism used to authenticate users of a networked system. Unf...
Using English words as passwords have been a popular topic in the last few years. The following arti...
National audienceUsing only publicly-available data and very modest computing power, we built a dict...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
Despite considerable research on passwords, empirical studies of password strength have been limited...
As more services and workflows are moved into computerized systems the number of accounts a person h...
Recently, there has been research on what factors influence a user’s password setting practices, whi...
Users tend to create passwords that are easy to guess, while system-assigned passwords tend to be ha...
International audiencePassphrases have many uses, such as serving as seeds for passwords. User-creat...
The goal of this thesis is to study the implementation of a passphrase system that implements new cr...
The combination of user-names and passwords has become the predominant method of user authentication...
Although the use of multiple methods of user authentication for IT system increases security, passwo...
Passwords are still the most used authentication mechanism for wide spectrum of use cases. Memorabil...
People tend to choose predictable passwords which are vulnerable to guessing attacks. To combat the ...
Research on more than 100 million passwords that have been leaked to the public domain has uncovered...
Textual passwords are often the only mechanism used to authenticate users of a networked system. Unf...
Using English words as passwords have been a popular topic in the last few years. The following arti...
National audienceUsing only publicly-available data and very modest computing power, we built a dict...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
Despite considerable research on passwords, empirical studies of password strength have been limited...
As more services and workflows are moved into computerized systems the number of accounts a person h...
Recently, there has been research on what factors influence a user’s password setting practices, whi...