Security Evaluation of Passwords Used on Internet

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Graphical Passwords over the Alphanumeric Passwords

Security in the computer is largely supported by the passwords for authentication process. The most common approach for authentication is alphanumeric passwords and alphanumeric passwords which has significant drawbacks. To overcome these drawbacks graphical passwords have been designed. That aim of generating these passwords to make passwords more memorable and easier for people to use and, th...

متن کامل

Improving passwords: influence of emotions on security behaviour

Purpose – This paper aims to study the influence of emotions on security behaviour by reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature. Researchers in ISS study how tomotivate people to adhere to security policies; theymainly focus on cognitive models such as the technology acceptance model (Davis, 1985), innovation diffusion theory (Brancheau and Wethe...

متن کامل

On the Semantic Patterns of Passwords and their Security Impact

We present the first framework for segmentation, semantic classification, and semantic generalization of passwords and a model that captures the semantic essence of password samples. Researchers have only touched the surface of patterns in password creation, with the semantics of passwords remaining largely unexplored, leaving a gap in our understanding of their characteristics and, consequentl...

متن کامل

A survey on the use of graphical passwords in security

Beginning around 1996, numerous graphical password schemes have been proposed, motivated by improving password usability and security, two key factors in password scheme evaluation. In this paper, we focus on the security aspects of existing graphical password schemes, which not only gives a simple introduction of attack methods but also intends to provide an in-depth analysis with specific sch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Algorithms & Computational Technology

سال: 2011

ISSN: 1748-3026,1748-3026

DOI: 10.1260/1748-3018.5.3.437