Searched for: +
(1 - 3 of 3)
document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
document
Li, Wenting (author), Wang, Ping (author), Liang, K. (author)
Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may...
journal article 2023
document
Li, Wenting (author), Yang, Jiahong (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Modeling password distributions is a fundamental problem in password security, benefiting the research and applications on password guessing, password strength meters, honey password vaults, etc. As one of the best segment-based password models, WordPCFG has been proposed to capture individual semantic segments (called words) in passwords....
conference paper 2023