Song et al., 2019 - Google Patents
Alphapwd: A password generation strategy based on mnemonic shapeSong et al., 2019
View PDF- Document ID
- 16213460688266220842
- Author
- Song J
- Wang D
- Yun Z
- Han X
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Password-based authentication is the first line of defense of most information systems. Password security concerns the security of the whole information system. Therefore, administrators will formulate corresponding password strategies to help users improve the …
- 230000001343 mnemonic 0 title abstract description 49
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Song et al. | Alphapwd: A password generation strategy based on mnemonic shape | |
| Guo et al. | Optiwords: A new password policy for creating memorable and strong passwords | |
| Uellenbeck et al. | Quantifying the security of graphical passwords: The case of android unlock patterns | |
| Li et al. | A {Large-Scale} empirical analysis of chinese web passwords | |
| Sun et al. | Dissecting pattern unlock: The effect of pattern strength meter on pattern selection | |
| Gao et al. | Yagp: Yet another graphical password strategy | |
| Han et al. | Regional patterns and vulnerability analysis of chinese web passwords | |
| Shay et al. | Designing password policies for strength and usability | |
| Aviv et al. | Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for Android's pattern unlock | |
| Song et al. | On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks | |
| Gao et al. | Design and analysis of a graphical password scheme | |
| Bhana et al. | Passphrase and keystroke dynamics authentication: Usable security | |
| Han et al. | TransPCFG: transferring the grammars from short passwords to guess long passwords effectively | |
| Loge et al. | On user choice for android unlock patterns | |
| Maqsood et al. | Bend Passwords: using gestures to authenticate on flexible devices | |
| Kävrestad et al. | Constructing secure and memorable passwords | |
| Yang et al. | Text entry method affects password security | |
| Meng et al. | On multiple password interference of touch screen patterns and text passwords | |
| Zhang et al. | Does the layout of the Android unlock pattern affect the security and usability of the password? | |
| Parkinson et al. | An empirical analysis of keystroke dynamics in passwords: A longitudinal study | |
| Ebbers et al. | The authentication game-secure user authentication by Gamification? | |
| Singh et al. | Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience | |
| Stanton et al. | Character strings, memory and passwords: What a recall study can tell us | |
| Yang et al. | TIM: Secure and usable authentication for smartphones | |
| Saeed et al. | PassNeighbor: a shoulder surfing resistant scheme |