Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2005, Computing Research Repository - CORR
…
9 pages
1 file
Many computer-basedauthentication schemata are based on pass- words. Logging on a computer, reading email, accessing content on a web server are all examples of applications where the identification of the user is usually accomplished matching the data provided by the user with data known by the application. Such a widespread approach relies on some assumptions, whose satisfaction is of foremost importance to guarantee the robustness of the solution. Some of these assumptions, like having a "secure" chan- nel to transmit data, or having sound algorithms to check the correct- ness of the data, are not addressed by this paper. We will focus on two simple issues: the problem of using adequate passwords and the problem of managing passwords. The proposed solution, the pathword, is a method that guarantees: • that the passwords generated with the help of a pathword are adequate (i.e. that they are not easy to guess), • that managing pathwords is more user friendly than managing...
2004
User authentication in computer systems has been a cornerstone of computer security for decades. The concept of a user id and password is a cost effective and efficient method of maintaining a shared secret between a user and a computer system. One of the key elements in the password solution for security is a reliance on human cognitive ability to remember the shared secret. In early computing days with only a few computer systems and a small select group of users, this model proved effective.
International Journal of ADVANCED AND APPLIED SCIENCES
In this paper, we analyze the passwords' strength from real-world data; perform an in-depth analysis, and extract useful information related to the millions of usernames and passwords being utilized. This useful information thus represents the millions of minds and the individual behaviors in online and offline passwords based information systems. From the twelve million usernames and passwords, we investigate density, numbers in usernames and passwords, special characters, and strength analysis of the usernames and passwords. To the best of our knowledge, this work is unique based on the selected parameters and the amount of processed data. With the extensive analysis, we seek the weak link in the username and password paradigm. With density analysis, it can be deduced that users like to have (or by chance use) similar character usernames and passwords. From the digits analysis in passwords, it is found that users like to use the first few digits (1, 2, and 3) and the last digits (8, 9, and 0). With the special character analysis, we found that "_" is the most widely used character. With the strength analysis, we determined that it is better to use non-popular English vocabulary words and the inclusion of the special characters, lower, upper and digits are in between different words. Also, if a word can be converted to other languages and used as a password, it will be extremely robust. Most users use their username partly or fully as passwords. This opens doors for hackers. The extensive experimentation and results in the appropriate sections provide useful contributions.
International Journal of Electronic Security and …, 2008
Network security partially depends on reliable user authentication; unfortunately currently used passwords are not completely secure. One of the main problems with passwords is that very good passwords are hard to remember and the ones which are easy to remember are too short or simple to be secure. We have designed a number of authentication schemas, which are easy to remember and can be relatively quickly provided to the system, while at the same time remaining impossible to break with brute force alone. In this article, we have compared the size of password spaces and how easy they are to remember for many popular alphanumeric and graphical authentication schemas against the approaches developed by us, namely PassText, PassArt and PassMap.
Handbook of Research on Social and Organizational Liabilities in Information Security, 2009
The traditional approach to security has been the use of passwords. They provide the system with a barrier to access what was quite safe in the analogical world. The digital era provided the means to easily try thousands of passwords in a short period of time and now the password schema is no longer safe. Now it suffers of the password's contradiction: the fact that it requires both simplicity and complexity to be usable and safe. Being so, new technologies are required that can preserve the easiness of use, but can provide stronger authentication processes. This chapter presents the latest advances in three technologies that can be used, unaided or together, to improve the safety of user/password schemas without significant changes in the protected information system architecture, despite the human factors that traditionally reduce the security of those systems. The presented technologies are Keystroke Dynamics, Graphical Authentication and Pointer Dynamic.
ISOC Network and Distributed System Security …, 2001
This paper presents a new password authentication and key agreement protocol, AMP, based on the ampli ed password idea. The intrinsic problems with password authentication are the password itself has low entropy and the password le is very hard to protect. We present the ampli ed password proof and the ampli ed password le for solving these problems. A party commits the high entropy information and ampli es her password with that information in the amplifed password proof. She never shows any information except that she knows it. Our ampli ed password proof idea is very similar to the zero-knowledge proof in that sense. We adds one more idea; the ampli ed password le for password le protection. A server stores the ampli ed veri ers in the ampli ed password le that is secure against a server le compromise and a dictionary attack. AMP mainly provides the password-veri er based authentication and the Di e-Hellman based key agreement, securely and e ciently. AMP is easy to generalize in any other cyclic groups. In spite of those plentiful properties, AMP is actually the most e cient protocol among the related protocols due to the simultaneous multiple exponentiation method. Several variants such as AMP i , AMP n , AMP n+ , AMP + , AMP ++ , and AMP c are also proposed. Among them, AMP n is actually the basic protocol of this paper that describes the ampli ed password proof idea while AMP is the most complete protocol that adds the ampli ed password le. AMP i simply removes the ampli ed password le from AMP. In the end, we give a comparison to the related protocols in terms of e ciency.
Journal of University of Human Development, 2016
Newly released researches disclose the need of canceling the incorrect opinion; security by Password (PW) is dead and proves that these believe has been hurtful. Moreover, recommended a campaign prioritize strategies of building PW. Considering the PW features such as costless, maturity and vast experiences, and usability PW continues to be the most used options in Information Security (IS), it is furthermore, consider most challengers to researchers and really needs further boosting. PWs control authentication mechanism of IS, requiring that individuals choose strong PW. The best advice to protect from hackers is randomly generating unique PW for every site and service, to apply this advice we need more techniques of easy to remember and hard to guess. This study proposed a bunch of easy to remember techniques for building a strong PW. Also, it exhibited the importance of similar strategy despite existing of many helpful PW managers. On the other hand, this paper compiled and analyzed today's data regarding authenticating secure systems via PW. Analyzed data showed some of common weakness in PW selection. Moreover, gathered information and evaluated data indicated the need of boosting PW. Proposed techniques and solutions enable individuals to select appropriate PW easily.
2021
In the age of digitalization, passwords play a significant role to protect user information. The growing number of data breaches has become a major problem allowing unauthorised parties to access confidential data. Over the years, passwords have been the first factor of authentication that is used in various segments, such as web applications, banking, e-commerce, and applications for authentication, etc. In most cases, the passwords are usually assigned to or created by the authorized user, and must be kept secret to keep unauthorized users from having access to information it is meant to protect. However, recent attacks have shown that these passwords are vulnerable to attacks such as, the dictionary, brute force, man in the middle, traffic interception, social engineering, and key logger attack, etc. In this paper, we discuss different types of passwords that prevent unauthorised access to protect users’ information. We analyze various attack techniques that are leveraged in many...
Computing Research Repository, 2009
Over the years security experts in the field of Information Technology have had a tough time in making passwords secure. This paper studies and takes a careful look at this issue from the angle of philosophy and cognitive science. We have studied the process of passwords to rank its strengths and weaknesses in order to establish a quality metric for passwords. Finally we related the process to human senses which enables us to propose a constitutional scheme for the process of password. The basic proposition is to exploit relationship between human senses and password to ensure improvement in authentication while keeping it an enjoyable activity.
Academia Mental Health and Well-Being, 2024
Objectives: This study examines attitudes consisting of thoughts, feelings, and behaviours (T-F-B) chains experienced in imagination by physicians before and during seeking treatment as a patient, and before and during treating another physician as a patient. Methods: Ninety-six physicians, from three countries, completed a questionnaire about their imagined attitudes in four situations: "before and during your visit to a physician as a patient" and "before and during a visit to you, as a physician, by another physician in the capacity of a patient". These questionnaires were retrolectively qualitatively analysed. Results: All four situations evoked negative and/or stressful reaction chains of T-F-B. Some of these chains were related to the situation in which two physicians meet, such as shame in asking for medical care from another physician and fear of failing as a consulting physician. Conclusion: There are specific barriers to physicians seeking treatment from and providing treatment to other physicians, especially shame on both sides. Aspiring physicians can learn what it means to ask for medical treatment as a physician, it can make them less anxious or insecure, and they can develop more compassion for their patients. The physician-to-physician healthcare barriers - a phenomenological qualitative study
2024
I rapporti tra la ricerca storica e la tutela del patrimonio artistico sono un tema oggi più che mai attuale, perché stanno alla base di una corretta ed efficace politica di gestione, conservazione e valorizzazione dei beni culturali. Le province di Como e Sondrio, da questo punto di vista, rappresentano nel panorama lombardo un osservatorio privilegiato, per le vicende complesse che hanno caratterizzato la riscoperta del territorio a partire dai flussi turistici di fine Ottocento e dalla grande esposizione voltiana del 1899, passando poi per la nascita di istituzioni e sodalizi finalizzati alla salvaguardia delle memorie storiche. Erano gli anni in cui le riviere dei laghi e le valli alpine venivano attraversate da “tourists” di eccezione, come Henry James, Antonio Fogazzaro, Edith Wharton; gli altri schieramenti di questa partita comprendono figure chiave della tutela come Francesco Malaguzzi Valeri e Luca Beltrami, Corradi Ricci e Nello Tarchiani da un lato, collezionisti e conoscitori come Emilio Visconti Venosta, i fratelli Bagatti Valsecchi, Giovanni Morelli e Bernard Berenson dall’altro lato. Le loro testimonianze, insieme a restauri, mostre, dispersioni, hanno plasmato – a volte trasformato e manipolato – un’idea di identità storica del territorio, che si è tramandata sino al presente ed è oggi affidata alla capacità di fruizione e valorizzazione di tutti i cittadini.
Εφημ. ΤΟ ΒΗΜΑ, 2024
Archaeological and Anthropological Sciences, 2018
The International journal of pharmacy practice, 2012
Journal of Asian Pacific Communication, 2014
2008 IEEE/ION Position, Location and Navigation Symposium, 2008
The Palgrave Encyclopedia of Critical Perspectives on Mental Health, 2021
World Allergy Organization Journal, 2015
International Journal of Radiation Oncology Biology Physics, 2015
International Journal of Cardiology, 2013