Let's Hash: Helping Developers with Password Security.
Lisa GeierhaasAnna-Marie OrtloffMatthew SmithAlena NaiakshinaPublished in: SOUPS @ USENIX Security Symposium (2022)
Keyphrases
- information security
- user authentication
- authentication mechanism
- authentication systems
- access control
- intrusion detection
- password based authenticated key exchange
- keystroke dynamics
- security issues
- hash functions
- statistical databases
- data structure
- graphical password
- security level
- security policies
- open source
- smart card
- network security
- software development
- security systems
- information systems
- password authentication
- end users
- software systems
- authentication protocol
- security protocols
- computer security
- security mechanisms
- software developers
- biometric systems
- rfid tags