Author image not provided
 Sean M Segreti

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article8.00
Citation Count48
Publication count6
Publication years2014-2016
Available for download5
Average downloads per article1,237.80
Downloads (cumulative)6,189
Downloads (12 Months)2,970
Downloads (6 Weeks)219
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


6 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 6 of 6
Sort by:

1 published by ACM
May 2016 CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 45,   Downloads (12 Months): 475,   Downloads (Overall): 940

Full text available: PDFPDF
Recent research has improved our understanding of how to create strong, memorable text passwords. However, this research has generally been in the context of desktops and laptops, while users are increasingly creating and entering passwords on mobile devices. In this paper we study whether recent password guidance carries over to ...
Keywords: passwords, security policy, usable security, password-composition policies, authentication, mobile devices

2 published by ACM
May 2016 CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 56,   Downloads (12 Months): 686,   Downloads (Overall): 1,228

Full text available: PDFPDF
Although many users create predictable passwords, the extent to which users realize these passwords are predictable is not well understood. We investigate the relationship between users' perceptions of the strength of specific passwords and their actual strength. In this 165-participant online study, we ask participants to rate the comparative security ...
Keywords: authentication, user behavior, passwords, perceptions of security, users' folk models, usable security

3 published by ACM
May 2016 ACM Transactions on Information and System Security (TISSEC): Volume 18 Issue 4, May 2016
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 87,   Downloads (12 Months): 1,139,   Downloads (Overall): 2,185

Full text available: PDFPDF
Password-composition policies are the result of service providers becoming increasingly concerned about the security of online accounts. These policies restrict the space of user-created passwords to preclude easily guessed passwords and thus make passwords more difficult for attackers to guess. However, many users struggle to create and recall their passwords ...
Keywords: Passwords, authentication, password-composition policy, usable security

4
August 2015 SEC'15: Proceedings of the 24th USENIX Conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 13

Parameterized password guessability--how many guesses a particular cracking algorithm with particular training data would take to guess a password--has become a common metric of password security. Unlike statistical metrics, it aims to model real-world attackers and to provide per-password strength estimates. We investigate how cracking approaches often used by researchers ...

5 published by ACM
April 2015 CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 12,   Downloads (12 Months): 196,   Downloads (Overall): 462

Full text available: PDFPDF
Users often struggle to create passwords under strict requirements. To make this process easier, some providers present real-time feedback during password creation, indicating which requirements are not yet met. Other providers guide users through a multi-step password-creation process. Our 6,435-participant online study examines how feedback and guidance affect password security ...
Keywords: passwords, security policy, usable security, password-composition policies, authentication

6 published by ACM
April 2014 CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 20
Downloads (6 Weeks): 19,   Downloads (12 Months): 474,   Downloads (Overall): 1,374

Full text available: PDFPDF
To encourage strong passwords, system administrators employ password-composition policies, such as a traditional policy requiring that passwords have at least 8 characters from 4 character classes and pass a dictionary check. Recent research has suggested, however, that policies requiring longer passwords with fewer additional requirements can be more usable and ...
Keywords: passwords, security policy, usable security, password-composition policies, authentication



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us