Department of Computer Science and Engineering, Symbiosis Institute of Technology - Pune Campus, Symbiosis International (Deemed University)Pune, India
Department of Computer Science and Engineering, Symbiosis Institute of Technology - Pune Campus, Symbiosis International (Deemed University)Pune, India
Department of Computer Science and Engineering, Symbiosis Institute of Technology - Pune Campus, Symbiosis International (Deemed University)Pune, India
Department of Computer Science and Engineering, Symbiosis Institute of Technology - Pune Campus, Symbiosis International (Deemed University)Pune, India
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
C. Florencio and C. Herley, “A large-scale study of web password habits,” in Proc. ACM SIGCHI Conf. Human Factors Comput. Syst., Seoul, South Korea, 2015, pp. 1–10.FlorencioC.HerleyC.“A large-scale study of web password habits,”inProc. ACM SIGCHI Conf. Human Factors Comput. Syst.Seoul, South Korea2015110Search in Google Scholar
X. Liu, Y. Wang, and J. Zhang, “Improving password security through machine learning-based strength estimation,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 4, pp. 865–879, Apr. 2018.LiuX.WangY.ZhangJ.“Improving password security through machine learning-based strength estimation,”IEEE Trans. Inf. Forensics Security134865879Apr.2018Search in Google Scholar
S. Kwon, J. Kim, and H. Lee, “Analyzing password vulnerabilities: Cracking methods and defenses,” J. Cyber Security, vol. 15, no. 3, pp. 45–58, 2020.KwonS.KimJ.LeeH.“Analyzing password vulnerabilities: Cracking methods and defenses,”J. Cyber Security15345582020Search in Google Scholar
B. Miller, R. Johnson, and A. Davis, “Comparative study of password cracking tools: Efficiency and security implications,” IEEE Trans. Cyber Security, vol. 9, no. 2, pp. 345–360, 2022.MillerB.JohnsonR.DavisA.“Comparative study of password cracking tools: Efficiency and security implications,”IEEE Trans. Cyber Security923453602022Search in Google Scholar
M. Wu, T. S. Smith, and L. Chen, “Educational impact of password security awareness programs,” in Proc. IEEE Int. Conf. Cyber Security, New York, NY, USA, 2021, pp. 89–94.WuM.SmithT. S.ChenL.“Educational impact of password security awareness programs,”inProc. IEEE Int. Conf. Cyber SecurityNew York, NY, USA20218994Search in Google Scholar
J. Wang and X. Zhang, “Entropy-based password strength measurement: A new approach,” in Proc. Int. Conf. Adv. Comput. Security, San Francisco, CA, USA, 2020, pp. 120–126.WangJ.ZhangX.“Entropy-based password strength measurement: A new approach,”inProc. Int. Conf. Adv. Comput. SecuritySan Francisco, CA, USA2020120126Search in Google Scholar
S. Das, K. Patel, and P. Reddy, “Effectiveness of rainbow table attacks against various hashing algorithms,” IEEE Access, vol. 8, pp. 234–245, 2020.DasS.PatelK.ReddyP.“Effectiveness of rainbow table attacks against various hashing algorithms,”IEEE Access82342452020Search in Google Scholar
R. D. Smith and J. Chen, “Comparative study of password hashing algorithms: bcrypt, PBKDF2, and Argon2,” IEEE Trans. Inf. Syst. Security, vol. 19, no. 4, pp. 340–355, 2021.SmithR. D.ChenJ.“Comparative study of password hashing algorithms: bcrypt, PBKDF2, and Argon2,”IEEE Trans. Inf. Syst. Security1943403552021Search in Google Scholar
Y. Ruoti and A. Muir, “Security risks of password reuse: A large-scale empirical study,” IEEE Trans. Depend. Secure Comput., vol. 18, no. 1, pp. 10–22, 2021.RuotiY.MuirA.“Security risks of password reuse: A large-scale empirical study,”IEEE Trans. Depend. Secure Comput.18110222021Search in Google Scholar
L. Toubiana, F. Miller, and K. Singh, “Human factors in password security: Behavioral influences,” in Proc. Int. Conf. Cyber Behav. Secur., London, U.K., 2017, pp. 140–152.ToubianaL.MillerF.SinghK.“Human factors in password security: Behavioral influences,”inProc. Int. Conf. Cyber Behav. Secur.London, U.K.2017140152Search in Google Scholar
R. Bonneau, C. Herley, and P. van Oorschot, “Password security: Alternative authentication mechanisms,” in Proc. IEEE Symp. Security Privacy, Washington, DC, USA, 2015, pp. 50–64.BonneauR.HerleyC.van OorschotP.“Password security: Alternative authentication mechanisms,”inProc. IEEE Symp. Security PrivacyWashington, DC, USA20155064Search in Google Scholar
M. Wang and Y. Zhang, “Phishing attacks and password compromises: A security analysis,” J. Inf. Security Res., vol. 22, no. 5, pp. 30–42, 2019.WangM.ZhangY.“Phishing attacks and password compromises: A security analysis,”J. Inf. Security Res.22530422019Search in Google Scholar
H. Hadnagy, Social Engineering: The Science of Human Hacking, 2nd ed. Hoboken, NJ, USA: Wiley, 2018.HadnagyH.Social Engineering: The Science of Human Hacking2nd ed.Hoboken, NJ, USAWiley2018Search in Google Scholar
A. Pashalidis and S. Furnell, “User compliance with password security policies,” Comput. Secur., vol. 65, pp. 120–134, 2016.PashalidisA.FurnellS.“User compliance with password security policies,”Comput. Secur.651201342016Search in Google Scholar
M. H. Zetter, P. J. O'Neill, and R. D. Vance, “User psychology in password creation: Security vs. memorability,” Comput. Human Behav., vol. 110, pp. 345–362, 2019.ZetterM. H.O'NeillP. J.VanceR. D.“User psychology in password creation: Security vs. memorability,”Comput. Human Behav.1103453622019Search in Google Scholar
C. McCarty and K. Leach, “Multi-factor authentication adoption and usability challenges,” Comput. Secur., vol. 85, pp. 100–112, 2017.McCartyC.LeachK.“Multi-factor authentication adoption and usability challenges,”Comput. Secur.851001122017Search in Google Scholar
S. P. Xu and L. Chen, “Passwordless authentication: A security perspective,” in Proc. IEEE Int. Conf. Cybersecurity Technol., 2021, pp. 250–260.XuS. P.ChenL.“Passwordless authentication: A security perspective,”inProc. IEEE Int. Conf. Cybersecurity Technol.2021250260Search in Google Scholar
X. Zhang, T. Lin, and P. Wei, “Deep learning-based password cracking: Effectiveness and countermeasures,” IEEE Trans. Neural Netw. Learn. Syst., vol. 34, no. 3, pp. 567–579, Mar. 2023.ZhangX.LinT.WeiP.“Deep learning-based password cracking: Effectiveness and countermeasures,”IEEE Trans. Neural Netw. Learn. Syst.343567579Mar.2023Search in Google Scholar
R. S. Mahmood and H. Ali, “Integrating password policies with user compliance strategies,” IEEE Trans. Inf. Syst. Security, vol. 17, no. 6, pp. 210–224, 2019.MahmoodR. S.AliH.“Integrating password policies with user compliance strategies,”IEEE Trans. Inf. Syst. Security1762102242019Search in Google Scholar
D. Alshaikh and M. Casey, “Evaluating password strength metrics: A security analysis,” in Proc. IEEE Int. Conf. Cyber Security Appl., Tokyo, Japan, 2020, pp. 98–112.AlshaikhD.CaseyM.“Evaluating password strength metrics: A security analysis,”inProc. IEEE Int. Conf. Cyber Security Appl.Tokyo, Japan202098112Search in Google Scholar
S. Jain and R. Gupta, “Deep learning-based password security enhancements,” in Proc. IEEE Int. Conf. Artificial Intelligence Security, Berlin, Germany, 2018, pp. 215–224.JainS.GuptaR.“Deep learning-based password security enhancements,”inProc. IEEE Int. Conf. Artificial Intelligence SecurityBerlin, Germany2018215224Search in Google Scholar
R. Shapiro and S. Levit, “Mobile application security and password management,” IEEE Trans. Mobile Comput., vol. 15, no. 5, pp. 780–795, 2020.ShapiroR.LevitS.“Mobile application security and password management,”IEEE Trans. Mobile Comput.1557807952020Search in Google Scholar
P. J. O'Neill and M. Casey, “Password entropy and its implications for security policies,” in Proc. IEEE Symp. Information Theory Security, Paris, France, 2020, pp. 88–102.O'NeillP. J.CaseyM.“Password entropy and its implications for security policies,”inProc. IEEE Symp. Information Theory SecurityParis, France202088102Search in Google Scholar