Password strength and memorability
In: Proceedings of FIKUSZ '11
AbstractUsers can be authenticated by three different ways: on the basis of what they know (password/pin), or what they have (smartcard etc.), or what they are (biometrics). The price and complexness of these methods increases in this order. One would think that the more complex or more expensive a method the better its efficiency is. This is not true by all means. A high enough security level can be reached by the cheapest and simplest method, by applying passwords. Of course, there are a few rules of thumb must be kept in mind.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
This chapter was published in: Pál Michelberger (ed.) Proceedings of FIKUSZ '11, , pages 23-30, 2011.
This item is provided by Óbuda University, Keleti Faculty of Business and Management in its series Proceedings of FIKUSZ '11 with number 23-30.
data security; user authentication; password strength;
Find related papers by JEL classification:
- M31 - Business Administration and Business Economics; Marketing; Accounting - - Marketing and Advertising - - - Marketing
- M37 - Business Administration and Business Economics; Marketing; Accounting - - Marketing and Advertising - - - Advertising
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Alexandra Vécsey).
If references are entirely missing, you can add them using this form.