Browsing Master Theses & Projects by Author "Thorpe, Julie"
Now showing items 1-8 of 8
-
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
Garcia, Ricardo Rodriguez (2013-03-01)The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ... -
An in-depth analysis of guesser behavior
Cushing, Connor (2020-11-01)We propose a methodology to perform an in-depth analysis on different password guessers and their guessing abilities. We devise new metrics and statistics that directly compare the types of passwords each guesser generates, ... -
An investigation of semantic patterns in passwords
Veras Guimaraes, Rafael (2013-08-01)The advent of large password leaks in recent years has exposed the security problems of passwords and enabled deeper empirical investigation of password patterns. Researchers have only touched the surface of patterns in ... -
Peer evaluation with graph neural networks
Namanloo, Alireza A. (2021-12-01)Peer assessment systems are rising in various social contexts, such as peer grading in large (online) classrooms, peer review in conferences, peer art evaluation, etc. However, peer assessments might not be as accurate as ... -
PiXi: an approach to nudge secure password creation
Wang, Shengqian (2023-04-01)Passwords, a first line of defense against unauthorized access, must be secure and memorable. However, people often struggle to create secure passwords they can recall. To address this problem, we design Password inspiration ... -
StoryPass: a system and study for memorable secure passphrases.
Bonk, Christopher Lockett (2014-10-01)The goal of this thesis is to study the implementation of a passphrase system that implements new creation policies, called StoryPass. We are motivated to do this research as current text-based authentication methods, ... -
Strategies and applications for creating more memorable passwords
MacRae, Brent Alexander (2016-01-01)As we continue to learn and grow in an ever evolving technological age, we deepen our understanding of the importance of authentication. There are many different types of authentication, each exhibiting their own strengths ... -
Towards improving the usability of system-assigned PINs: can implicit learning techniques help?
Jui, Israt Jahan (2023-08-01)Personal Identification Numbers (PINs) are widely used for automated teller machines (ATMs), computers, mobile devices, debit cards, and credit cards. People tend to choose easy-to-recall PINs that are related to important ...