Journals

PiXi: Password Inspiration by Exploring Information

Dissecting Nudges in Password Managers: Simple Defaults are Powerful

Do Password Managers Nudge Secure (Random) Passwords?

Improving Peer Assessment with Graph Neural Networks

A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords

In this article, we present a thorough evaluation of semantic password grammars. We report multifactorial ex-periments that test the impact of sample size, probability smoothing, and linguistic information on password cracking. The semantic grammars …

Long Passphrases: Potentials and Limits

Passphrases offer an alternative to traditional passwords which aim to be stronger and more memorable. However, users tend to choose short passphrases with predictable patterns that may reduce the security they offer. To explore the potential of long …

Enhanced Tacit Secrets

We explore the feasibility of Tacit Secrets: system-assigned pass- words that you can remember, but cannot write down or otherwise commu- nicate. We design an approach to creating Tacit Secrets based on Contextual Cueing, an implicit learning method …

On Password Behaviours and Attitudes in Different Populations

We explore the differences in password behaviours and attitudes of samples of university students, IT professionals, and the general population (non-student and non-IT professional). Currently, text-based password authentication is the most commonly …

An Exploration of Geographic Authentication Schemes

We design and explore the usability and security of two geographic authentication schemes: GeoPass and GeoPassNotes. GeoPass requires users to choose a place on a digital map to authenticate with (a location password). GeoPassNotes-an extension of …

Exploiting Predictability in Click-Based Graphical Passwords

We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We …