Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
45,892
result(s) for
"Passwords"
Sort by:
Passwords : philology, security, authentication
Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls \"crypto-philology\" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- Provided by publisher
Encouraging users to improve password security and memorability
2019
Security issues in text-based password authentication are rarely caused by technical issues, but rather by the limitations of human memory, and human perceptions together with their consequential responses. This study introduces a new user-friendly guideline approach to password creation, including persuasive messages that motivate and influence users to select more secure and memorable text passwords without overburdening their memory. From a broad understanding of human factors-caused security problems, we offer a reliable solution by encouraging users to create their own formula to compose passwords. A study has been conducted to evaluate the efficiency of the proposed password guidelines. Its results suggest that the password creation methods and persuasive message provided to users convinced them to create cryptographically strong and memorable passwords. Participants were divided into two groups in the study. The participants in the experimental group who were given several password creation methods along with a persuasive message created more secure and memorable passwords than the participants in the control group who were asked to comply with the usual strict password creation rules. The study also suggests that our password creation methods are much more efficient than strict password policy rules. The security and usability evaluation of the proposed password guideline showed that simple improvements such as adding persuasive text to the usual password guidelines consisting of several password restriction rules make significant changes to the strength and memorability of passwords. The proposed password guidelines are a low-cost solution to the problem of improving the security and usability of text-based passwords.
Journal Article
A Review on Secure Authentication Mechanisms for Mobile Security
by
Akbar, Habib
,
Khan, Muhammad Faizan
,
Hasan, Syed Shabih Ul
in
authentication schemes
,
Biometrics
,
Cybersecurity
2025
Cybersecurity, complimenting authentication, has become the backbone of the Internet of Things. In the authentication process, the word authentication is of the utmost importance, as it is the door through which both Mr. Right Guy and Mr. Wrong Guy can pass. It is the key to opening the most important and secure accounts worldwide. When authentication is complete, surely there will be passwords. Passwords are a brain-confusing option for the user to choose when making an account during the registration/sign-up process. Providing reliable, effective, and privacy-preserving authentication for individuals in mobile networks is challenging due to user mobility, many attack vectors, and resource-constrained devices. This review paper explores the transformation and modern mobile authentication schemes, categorizing them into password, graphical, behavioral, keystroke, biometric, touchscreen, color, and gaze-based methodologies. It aims to examine the strengths and limitations focused on challenges like security and usability. Standard datasets and performance evaluation measures are also discussed. Finally, research gaps and future directions in this essential and emerging area of research are discussed.
Journal Article
A Systematic Review on Password Guessing Tasks
2023
Recently, many password guessing algorithms have been proposed, seriously threatening cyber security. In this paper, we systematically review over thirty methods for password guessing published between 2016 and 2023. First, we introduce a taxonomy for classifying the existing methods into trawling guessing and targeted guessing. Second, we present an extensive benchmark dataset that can assist researchers and practitioners in successive works. Third, we conduct a bibliometric analysis to present trends in this field and cross-citation between reviewed papers. Further, we discuss the open challenges of password guessing in terms of diverse application scenarios, guessing efficiency, and the combination of traditional and deep learning methods. Finally, this review presents future research directions to guide successive research and development of password guessing.
Journal Article
A Scheme of IBE Key Issuing Protocol Based on Identity-password Pair
by
Shi, Weimin
in
Passwords
2012
To avoid the impersonation attack, an efficient and secure key issuing protocol based on identity-password pair is proposed, in which an additional identity-password pair issued by KGC and KPAs is used to authenticate a user’s identity. In this protocol we use a simple blinding technique to eliminate the of secure channel and multiple authorities approach to avoid the key escrow problem. Our protocol solves the key-escrow problem successfully and saves at least 4n pairing and 2n Hash operations in comparison to Lee B et al’s protocol.
Journal Article
Why “magic links” and passcodes are taking over news logins
by
Neel Dhanesha
in
Passwords
2026
Web Resource
Why “magic links” and passcodes are taking over news logins
by
Neel Dhanesha
in
Passwords
2026
Web Resource