Weak Password Security: An Empirical Study.
James E. WeberDennis C. GusterPaul SafonovMark B. SchmidtPublished in: Inf. Secur. J. A Glob. Perspect. (2008)
Keyphrases
- information security
- user authentication
- security issues
- authentication systems
- intrusion detection
- information assurance
- password based authenticated key exchange
- computer security
- network security
- access control
- security requirements
- security level
- security mechanisms
- authentication mechanism
- password authentication
- security systems
- graphical password
- biometric recognition
- biometric authentication
- security problems
- cyber security
- database
- data mining