In today's corporate IT systems, employees routinely repeat an undeniable pattern: accessing a huge number of password-protected services. In this regard, although deploying a strong enterprise password policy can increase security against online breaches and data leaks, it also imposes a significant usability burden on users. To alleviate this problem, password managers (PMs) are considered user-friendly tools that automate password generation and login processes. But how secure and usable are these tools? The authors analyze the four most popular PMs with free versions from both security and usability perspectives. The comparison leads to recommendations on enterprise PM selection, as well as to the identification of new lines of research...
As users of technology in our everyday actions we need to authenticate in different applications, in...
Despite their well-known security problems, passwords are still the incumbent authentication method ...
A password is considered to be the first line of defence in protecting online accounts, but there ar...
In today's corporate IT systems, employees routinely repeat an undeniable pattern: accessing a huge ...
Employees within enterprises have hundreds of passwords to remember. This problem is known as passwo...
Password managers are tools to support users with the secure generation and storage of credentials a...
Passwords are considered to be the first line of defence in protecting online accounts and data. Ho...
Abstract—We evaluate two decades of proposals to replace text passwords for general-purpose user aut...
Cybersecurity has become one of the largest growing fields in computer science and the technology in...
Information is considered a valuable asset to most organisations and is often exposed to various thr...
The purpose of this thesis is to describe and compare password managers for users and small teams on...
To date, system research has focused on designing security mechanisms to protect systems access alth...
User accounts at Internet services contain a multitude of personal data such as messages, documents,...
Enterprise systems need reliable, flexible and secure means for making public and confidential infor...
Passwords continue to prevail on the web as the primary method for user authentication despite their...
As users of technology in our everyday actions we need to authenticate in different applications, in...
Despite their well-known security problems, passwords are still the incumbent authentication method ...
A password is considered to be the first line of defence in protecting online accounts, but there ar...
In today's corporate IT systems, employees routinely repeat an undeniable pattern: accessing a huge ...
Employees within enterprises have hundreds of passwords to remember. This problem is known as passwo...
Password managers are tools to support users with the secure generation and storage of credentials a...
Passwords are considered to be the first line of defence in protecting online accounts and data. Ho...
Abstract—We evaluate two decades of proposals to replace text passwords for general-purpose user aut...
Cybersecurity has become one of the largest growing fields in computer science and the technology in...
Information is considered a valuable asset to most organisations and is often exposed to various thr...
The purpose of this thesis is to describe and compare password managers for users and small teams on...
To date, system research has focused on designing security mechanisms to protect systems access alth...
User accounts at Internet services contain a multitude of personal data such as messages, documents,...
Enterprise systems need reliable, flexible and secure means for making public and confidential infor...
Passwords continue to prevail on the web as the primary method for user authentication despite their...
As users of technology in our everyday actions we need to authenticate in different applications, in...
Despite their well-known security problems, passwords are still the incumbent authentication method ...
A password is considered to be the first line of defence in protecting online accounts, but there ar...