Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2023
Privacy and Data Security in Everyday Online Services for Older Adults
DSAI '22: Proceedings of the 10th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusionAugust 2022, Pages 203–207https://doi.org/10.1145/3563137.3563149Older adults are gradually increasing their online activities and usage of online services, including social media applications, online shopping, and online banking. These online services provide many benefits to older adults, but also introduce ...
- research-articleJune 2022
A Scrutiny of Honeyword Generation Methods: Remarks on Strengths and Weaknesses Points
Cybernetics and Information Technologies (CYBAIT), Volume 22, Issue 2Jun 2022, Pages 3–25https://doi.org/10.2478/cait-2022-0013AbstractHoneyword system is a successful password cracking detection system. Simply the honeywords are (False passwords) that are accompanied to the sugarword (Real password). Honeyword system aims to improve the security of hashed passwords by ...
- research-articleJuly 2022
Automated detection of password leakage from public GitHub repositories
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringMay 2022, Pages 175–186https://doi.org/10.1145/3510003.3510150The prosperity of the GitHub community has raised new concerns about data security in public repositories. Practitioners who manage authentication secrets such as textual passwords and API keys in the source code may accidentally leave these texts in the ...
- research-articleMarch 2022
A Proposal for Honeyword Generation via Meerkat Clan Algorithm
Cybernetics and Information Technologies (CYBAIT), Volume 22, Issue 1Mar 2022, Pages 40–59https://doi.org/10.2478/cait-2022-0003AbstractAn effective password cracking detection system is the honeyword system. The Honeyword method attempts to increase the security of hashed passwords by making password cracking easier to detect. Each user in the system has many honeywords in the ...
- research-articleJanuary 2022
Safety and convenience of internet banking keyboard security technology
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 12, Issue 32022, Pages 230–236https://doi.org/10.1504/ijitst.2022.122075The keyboard is a traditional input device that transmits the values entered by the user to the computer. Attackers can find out the keyboard values entered by internet banking users, and some of the values are actually implemented and used. Although ...
-
- research-articleJanuary 2022
The count-min sketch is vulnerable to offline password-guessing attacks
International Journal of Information and Computer Security (IJICS), Volume 18, Issue 1-22022, Pages 27–39https://doi.org/10.1504/ijics.2022.122912The count-min sketch is used to prevent users from selecting popular passwords so as to increase password-guessing attackers' cost and difficulty. This approach was proposed by Schechter et al. (2010) at USENIX Conference on Hot Topics in Security in ...
- research-articleJanuary 2022
A secure hash function based on sponge construction and chaos-maps
International Journal of Computational Science and Engineering (IJCSE), Volume 25, Issue 32022, Pages 285–297https://doi.org/10.1504/ijcse.2022.123116This work introduces a new hash function based on the sponge structure and two chaotic maps. It aims to avoid the major problems of Merkle-Damgård construction and ad hoc structures such as multi-collision and length extension attacks. The proposed hash ...
- research-articleFebruary 2022
A Privacy Preserving Two-Ticket Management System Based on Negative Database for Smart Grid
ACAI '21: Proceedings of the 2021 4th International Conference on Algorithms, Computing and Artificial IntelligenceDecember 2021, Article No.: 49, Pages 1–6https://doi.org/10.1145/3508546.3508595In China, the electric power industry has used the two-ticket system to ensure safety of power production and employees. Currently, the two-ticket system are normally paper based and manually operated, suffering problems such as invalid ticket filling, ...
- research-articleJune 2021
HoneyGen: Generating Honeywords Using Representation Learning
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityMay 2021, Pages 265–279https://doi.org/10.1145/3433210.3453092Honeywords are false passwords injected in a database for detecting password leakage. Generating honeywords is a challenging problem due to the various assumptions about the adversary's knowledge as well as users' password-selection behaviour. The ...
- research-articleJuly 2021
A Survey on Multi-Factor Authentication Methods for Mobile Devices
ICSIM '21: Proceedings of the 2021 4th International Conference on Software Engineering and Information ManagementJanuary 2021, Pages 199–205https://doi.org/10.1145/3451471.3451503The use of mobile devices worldwide has been on the increase. More and more people are using mobile devices to carry out activities on the Internet. The activities include checking emails, online banking, school, and work activities. However, mobile ...
- research-articleAugust 2020
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
- Geumhwan Cho,
- Jun Ho Huh,
- Soolin Kim,
- Junsung Cho,
- Heesung Park,
- Yenah Lee,
- Konstantin Beznosov,
- Hyoungshick Kim
ACM Transactions on Privacy and Security (TOPS), Volume 23, Issue 4Article No.: 22, Pages 1–32https://doi.org/10.1145/3410155The latest smartphones have started providing multiple authentication options including PINs, patterns, and passwords (knowledge based), as well as face, fingerprint, iris, and voice identification (biometric-based). In this article, we conducted two ...
- abstractApril 2020
Towards an Empirical Cost Model for Mental Password Algorithms
CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing SystemsApril 2020, Pages 1–8https://doi.org/10.1145/3334480.3382990Reliance on technology has diminished our use of mental computation. However, mental computation's inherent privacy features are becoming central to new research on creating more secure and usable passwords than one gets with approaches such as password ...
- research-articleDecember 2019
Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 14, Issue 3Dec 2019https://doi.org/10.1007/s11704-019-7342-yAbstractPassword authentication is vulnerable to dictionary attacks. Password strength measurement helps users to choose hard-to-guess passwords and enhance the security of systems based on password authentication. Although there are many password ...
- research-articleFebruary 2020
Hide my Gaze with EOG!: Towards Closed-Eye Gaze Gesture Passwords that Resist Observation-Attacks with Electrooculography in Smart Glasses
MoMM2019: Proceedings of the 17th International Conference on Advances in Mobile Computing & MultimediaDecember 2019, Pages 107–116https://doi.org/10.1145/3365921.3365922Smart glasses allow for gaze gesture passwords as a hands-free form of mobile authentication. However, pupil movements for password input are easily observed by attackers, who thereby can derive the password. In this paper we investigate closed-eye gaze ...
- research-articleMarch 2020
Keystroke Dynamics in Mobile Platform
EBIMCS '19: Proceedings of the 2019 2nd International Conference on E-Business, Information Management and Computer ScienceAugust 2019, Article No.: 11, Pages 1–8https://doi.org/10.1145/3377817.3377843Recently popularity in current digital devices with touch sense system such as smartphones, iPad, iPod, Nintendo DS, Automated Teller Machine (ATM), Windows 10 devices and etc. Smartphone is the one of main communication device in current global because ...
- research-articleApril 2019
Using Episodic Memory for User Authentication
ACM Transactions on Privacy and Security (TOPS), Volume 22, Issue 2Article No.: 11, Pages 1–34https://doi.org/10.1145/3308992Passwords are widely used for user authentication, but they are often difficult for a user to recall, easily cracked by automated programs, and heavily reused. Security questions are also used for secondary authentication. They are more memorable than ...
- research-articleJanuary 2019
CSPS: catchy short passwords making offline and online attacks impossible
International Journal of Information and Computer Security (IJICS), Volume 11, Issue 32019, Pages 255–274https://doi.org/10.1504/ijics.2019.099434This paper proposes to address online and offline attacks to passwords without increasing users' efforts in choosing and memorising their passwords. In CSPS, a password consists of two parts, a user-chosen short password and a server-generated long ...
- research-articleJanuary 2019
Online Authentication Methods Used in Banks and Attacks Against These Methods
Procedia Computer Science (PROCS), Volume 151, Issue C2019, Pages 1052–1059https://doi.org/10.1016/j.procs.2019.04.149AbstractGrowing threats and attacks to online banking security (e.g. phishing, identity theft) motivates most banks to look for and use stronger authentication methods instead of using a normal username and password authentication. The main objective of ...
- posterDecember 2018
Personality, culture and password behavior: a relationship study
AfriCHI '18: Proceedings of the Second African Conference for Human Computer Interaction: Thriving CommunitiesDecember 2018, Article No.: 36, Pages 1–4https://doi.org/10.1145/3283458.3283530Culture - an aggregation of people's location, language, tribe and economic activities might have a role to play in the security decisions of users. Culture in this context is even more relevant in most African societies as there are many ethnic groups. ...
- research-articleOctober 2018
On the Accuracy of Password Strength Meters
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2018, Pages 1567–1582https://doi.org/10.1145/3243734.3243769Password strength meters are an important tool to help users choose secure passwords. Strength meters can only then provide reasonable guidance when they are accurate, i.e., their score correctly reflect password strength. A strength meter with low ...