2019
DOI: 10.1007/978-3-030-14070-0_2
|View full text |Cite
|
Sign up to set email alerts
|

Password Security in Organizations: User Attitudes and Behaviors Regarding Password Strength

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…For password strength estimation, we use the zxcvbn algorithm by Wheeler [42] as it provides a well-usable password strength estimation API 1 in JavaScript and a significantly improved estimation accuracy compared to simple approaches, e.g., LUDS. For sound generation, we use Tone.js, a cross-platform, cross-device WebAudio framework for creating interactive sound and music applications in the browser [27].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For password strength estimation, we use the zxcvbn algorithm by Wheeler [42] as it provides a well-usable password strength estimation API 1 in JavaScript and a significantly improved estimation accuracy compared to simple approaches, e.g., LUDS. For sound generation, we use Tone.js, a cross-platform, cross-device WebAudio framework for creating interactive sound and music applications in the browser [27].…”
Section: Methodsmentioning
confidence: 99%
“…Passwords are still one of the most common forms of authentication in use today [4]. Security problems caused by choosing weak password or reusing them has significant impact on the economy and society [1]. Creating unique, strong passwords for every user account can be perceived as difficult or annoying.…”
Section: Introductionmentioning
confidence: 99%
“…Authentication mechanisms make it more difficult for an attacker to breach a system and its failure poses a risk to a system. Passwords are a fundamental part of authentication but are easily disclosed by cyber-attacks (Almehmadi & Alsolami, 2019). The authors conclude that implementing multi-factor authentication (MFA) is necessary to deal with password vulnerabilities.…”
Section: Literature Reviewmentioning
confidence: 99%