Weak and Strong Passwords: When to Use Them and How to Protect Them
Date: December 2012
Publication: Passwords^12 (Passwords12)
Source 1: http://passwords12.at.ifi.uio.no/Audun_Josang_Weak_and_strong_passwords_Passwords12.pdf
This presentation discusses how differing password security needs are associated with authentication assurance levels established in government standards. Some discussion of how the various standards differ is shared. The password policies at several Internet sites were evaluated and their authentication assurance level was estimated.
PasswordResearch.com Note: Video of presentation available: https://www.youtube.com/watch?v=GAoqxh4ENJY
Do you have additional information to contribute regarding this research paper? If so, please email firstname.lastname@example.org with the details.