Text passwords-a frequent vector for account compromise, yet still ubiquitous-have been studied for decades by researchers attempting to determine how to coerce users to create passwords that are hard for a ackers to guess but still easy for users to type and memorize. Most studies examine one password or a small number of passwords per user, and studies o en rely on passwords created solely for the purpose of the study or on passwords protecting low-value accounts. ese limitations severely constrain our understanding of password security in practice, including the extent and nature of password reuse, password behaviors speci c to categories of accounts (e.g., nancial websites), and the e ect of password managers and other privacy tools. In this paper we report on an in situ study of 154 participants over an average of 147 days each. Participants' computers were instrumented-with careful a ention to privacy-to record detailed information about password characteristics and usage, as well as many other computing behaviors such as use of security and privacy web browser extensions. is data allows a more accurate analysis of password characteristics and behaviors across the full range of participants' web-based accounts. Examples of our ndings are that the use of symbols and digits in passwords predicts increased likelihood of reuse, while increased password strength predicts decreased likelihood of reuse; that password reuse is more prevalent than previously believed, especially when partial reuse is taken into account; and that password managers may have no impact on password reuse or strength. We also observe that users can be grouped into a handful of behavioral clusters, representative of various password management strategies. Our ndings suggest that once a user needs to manage a larger number of passwords, they cope by partially and exactly reusing passwords across most of their accounts.
A graph is apex if it can be made planar by deleting a vertex, that is, ∃v such that G − v is planar. We define the related notions of edge apex, ∃e such that G − e is planar, and contraction apex, ∃e such that G/e is planar, as well as the analogues with a universal quantifier: ∀v, G − v planar; ∀e, G − e planar; and ∀e, G/e planar. The Graph Minor Theorem of Robertson and Seymour ensures that each of these six gives rise to a finite set of obstruction graphs. For the three definitions with universal quantifiers we determine this set. For the remaining properties, apex, edge apex, and contraction apex, we show there are at least 36, 55, and 82 obstruction graphs respectively. We give two similar approaches to almost nonplanar (∃e, G + e is nonplanar and ∀e, G + e is nonplanar) and determine the corresponding minor minimal graphs.This has two useful consequences. We say G is minor minimal P (or MMP) if G has property P but no proper minor does. Corollary 1.3. For any graph property P, there is a corresponding finite set of minor minimal P graphs.Corollary 1.4. Let P be a graph property that is closed under taking minors. Then there is a finite set of minor minimal non-P graphs S such that for any graph G, G satisfies P if and only if G has no minor in S.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.