2017 13th International Conference on Computational Intelligence and Security (CIS) 2017
DOI: 10.1109/cis.2017.00129
|View full text |Cite
|
Sign up to set email alerts
|

CombinedPWD: A New Password Authentication Mechanism Using Separators Between Keystrokes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…An online password mechanism named "Combined-PWD" that inserts blanks into passwords can resist brute force attacks and dictionary attacks effectively [215]. During registration, users can choose to set specified characters or blanks anywhere in the passwords string.…”
Section: Challenge Questionsmentioning
confidence: 99%
“…An online password mechanism named "Combined-PWD" that inserts blanks into passwords can resist brute force attacks and dictionary attacks effectively [215]. During registration, users can choose to set specified characters or blanks anywhere in the passwords string.…”
Section: Challenge Questionsmentioning
confidence: 99%
“…This trend can be seen in the rise of two-factor or multi-factor authentication, colloquially known as 2FA and MFA respectively [ 10 , 11 , 12 , 13 ]. However, the rise of padding front-end authentication portals with such techniques has led to inflated user responsibilities without as great of security as is thought; these methods help protect against front-facing brute-forcing and dictionary attacks, but often do not add any additional layers of protection to more common forms of cyber-attacks, such as phishing, man-in-the-middle (MiTM), or replay attacks [ 7 , 8 , 12 , 14 , 15 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
“…Other countermeasures include reactive password checking, heightened access control, stronger password hashing and salting, and complex, generated passwords [ 8 , 16 ]. Most of these countermeasures are focused on padding the security of alphanumeric passwords however [ 15 ]. A large body of research has been done in an attempt to replace these as well; the most common of these proposals include either biometric or graphical alternatives to alphanumeric passwords [ 8 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
“…These attacks include among others the Phishing, Man-in-the-Middle, etc. Zheng and Jia [27] suggest the use of separators between keystrokes to address the leaked password issues. This means that the blank space is inserted within the password for better authentications.…”
Section: 2password Biometric Authenticationmentioning
confidence: 99%