Authentication Research Paper Index
A core objective of the Password Research Institute is to improve the industry awareness of existing authentication research. Many valuable solutions for the problems associated with authentication have gone unnoticed by the people interested in, or responsible for, authentication security.
This project will compile and share a comprehensive, but moderated, index of password and authentication related research papers. We aim to share the details of useful papers, provide access to the papers, and encourage collaboration between authors and other security professionals.
Please note that we are currently in the process of manually transferring our existing database of research papers into a new format that can be published here. Accordingly, you may see papers missing from this index that we fully intend to share as soon as possible. Thank you for your patience during this work.
If you have an appropriate research paper to add, please send a copy of the paper along with details on its source to firstname.lastname@example.org.
Research Paper Index
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
The Security and Memorability of Passwords Generated by Using an Association Element and a Personal Factor
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation
A Stealth Approach to Usable Security: Helping IT Security Managers to Identify Workable Security Solutions
High performance password cracking by implementing rainbow tables on nVidia graphics cards (IseCrack)
A Comparison of Perceived and Real Shoulder-Surfing Risks Between Alphanumeric and Graphical Passwords
Evaluation on a Keystroke Authentication System by Keying Force Incorporated with Temporal Characteristics of Keystroke Dynamics
Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems
A Framework for the Selection, Use, Deployment and Management of Strong Authentication Mechanisms within Computer Systems
"Ten Strikes and You're Out": Increasing the Number of Login Attempts Can Improve Password Usability
Improving computer security for authentication of users: Influence of proactive password restrictions
Transforming the 'Weakest Link' — a Human/Computer Interaction Approach to Usable and Effective Security
Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates