How biometric authentication poses new challenges to our security and privacy, IEEE Signal Processing Magazine, vol.34, issue.4, pp.196-194, 2017. ,
Using Externals IdPs on OpenStack: A Security Analysis of OpenID Connect, Facebook Connect, and OpenStack Authentication, IEEE 32nd International Conference on Advanced Information Networking and Applications -AINA, vol.00, pp.920-927, 2018. ,
5 myths of password security, pp.2017-2029, 2013. ,
Password entropy and password quality, 4th International Conference on Network and System Security, pp.583-587, 2010. ,
The science of guessing: Analyzing an anonymized corpus of 70 million passwords, IEEE Symposium on Security and Privacy, pp.538-552, 2012. ,
Encountering stronger password requirements: User attitudes and behaviors, Proceedings of the 6th Symposium on Usable Privacy and Security, ser. SOUPS '10, pp.1-20, 2010. ,
I added '!'at the end to make it secure: Observing password creation in the lab, Proceedings of the 11th symposium on usable privacy and security, 2015. ,
The security risks of using "forgot my password" to manage passwords, 2016. ,
The equifax data breach: What to do, 2017. ,
Publishable humanly usable secure password creation schemas, 3rd AAAI Conference on Human Computation and Crowdsourcing, 2015. ,
Usability and security of text passwords on mobile devices, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ser. CHI '16, pp.527-539, 2016. ,
Diversify to survive: Making passwords stronger with adaptive policies, 13th Symposium on Usable Privacy and Security -SOUPS, pp.1-12, 2017. ,
Password policy effects on entropy and recall: Research in progress, Americas Conference on Information Systems, 2012. ,
An empirical study of mnemonic sentence-based password generation strategies, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '16, pp.1216-1229, 2016. ,
Linguistic properties of multi-word passphrases, International Conference on Financial Cryptography and Data Security, pp.1-12, 2012. ,
The usability of passphrases for authentication: An empirical field study, International journal of human-computer studies, vol.65, issue.1, pp.17-28, 2007. ,
Can long passwords be secure and usable, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI '14, pp.2927-2936, 2014. ,
Passwords usage and human memory limitations: A survey across age and educational background, PLoS One, vol.7, issue.12 ,
Centrify password survey: Summary, Centrify, Tech. Rep, 2014. ,
6) The case of case-insensitive passwords, 2012. ,
pASSWORD tYPOS and how to correct them securely, IEEE Symposium on Security and Privacy, pp.799-818, 2016. ,
The typtop system: Personalized typo-tolerant password checking, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '17, pp.329-346, 2017. ,
Password typo correction using discrete logarithms, 8th International Conference on Computer Science and Communication Engineering, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02550719
A new distribution-sensitive secure sketch and popularity-proportional hashing, Advances in Cryptology -CRYPTO, pp.682-710, 2017. ,
The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems, Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12, pp.378-390, 2012. ,
Great crypto failures, Virus Bulletin Conference, 2016. ,
A technique for computer detection and correction of spelling errors, Communications of the ACM, vol.7, issue.3, pp.171-176, 1964. ,
The generation of random permutations on the fly, Information Processing Letters, vol.28, issue.4, pp.207-212, 1988. ,
Fisher-yates shuffle, Dictionary of algorithms and data structures, vol.19, 2005. ,
The cost of credential stuffing, 2017. ,
Understanding password choices: How frequently entered passwords are re-used across websites, 12th Symposium on Usable Privacy and Security -SOUPS, pp.175-188, 2016. ,
Your clever password tricks aren't protecting you from today's hackers, 2014. ,
Gpu-based password cracking, 2011. ,
On the indifferentiability of the sponge construction, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.181-197, 2008. ,
Pkcs# 5: Password-based cryptography specification version 2.0, RFC Editor, 2000. ,
Argon2: new generation of memory-hard functions for password hashing and other applications, IEEE European Symposium on Security and Privacy -EuroS&P, pp.292-302, 2016. ,
If your password is 123456, just make it hackme, 2010. ,
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms, IEEE Symposium on Security and Privacy, pp.523-537, 2012. ,
Nist special publication 800-63-2, Electronic Authentication Guideline, vol.1, 2004. ,
Rfc 2460-internet protocol, version 6 (ipv6) specification, 1998. ,
Argon2 in browser, 2018. ,
Webassembly: high speed at low cost for everyone, ML16: Proceedings of the 2016 ACM SIGPLAN Workshop on ML, 2016. ,