2006
DOI: 10.1007/11880561_16
|View full text |Cite
|
Sign up to set email alerts
|

Improving Usability Through Password-Corrective Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…On the input error side, there is password-corrective hashing [21]. In this approach hash functions map similar passwords to the same output, for example, passwords that differ with respect to character transpositions and substitutions.…”
Section: B Client-side Mechanismsmentioning
confidence: 99%
“…On the input error side, there is password-corrective hashing [21]. In this approach hash functions map similar passwords to the same output, for example, passwords that differ with respect to character transpositions and substitutions.…”
Section: B Client-side Mechanismsmentioning
confidence: 99%
“…Several proposals have been made reduce the rate of errors, either by storing multiple hashes of a passphrase to recognise entry of nearly-correct strings [16,2] or by providing visual feedback to allow a user to notice typos when they are made [18]. Passphrases may in fact be more usable in the context of mobile phones, which have input interfaces optimised for natural language and not for pseudorandom character strings [10].…”
Section: Introductionmentioning
confidence: 99%
“…(In contrast, spell-correction functionality is typically disabled on password entry, as historical policies and practices discourage use of dictionary words as passwords.) Earlier proposals allowing variability in how passwords are entered include the pass-sentences of Spector et al [40] which focus on semantic meaning allowing variable syntactic representation, the password-corrective hashing of Mehler and Skiena [29], and order-independent and errortolerant passphrases by Bard [2]; see also Brown [8], and Jakobsson's more recent fastword multi-word proposal [23].…”
mentioning
confidence: 99%