• Pan L, Qiu R, Zhang C and Yang M. (2024). Building a Secure Cross-Device Communication Channel for Smart Devices Based on App Accounts 2024 IEEE International Conference on Cyber Security and Resilience (CSR). 10.1109/CSR61664.2024.10679353. 979-8-3503-7536-7. (360-366).

    https://ieeexplore.ieee.org/document/10679353/

  • Zhao Q, Jiang B, Zhang Y, Wang H, Mao Y and Zhong S. (2024). Unbalanced private set intersection with linear communication complexity. Science China Information Sciences. 10.1007/s11432-022-3717-9. 67:3. Online publication date: 1-Mar-2024.

    https://link.springer.com/10.1007/s11432-022-3717-9

  • Chakraborty N, Shojafar M, Chen Z, Leung V, Li J and Zulkernine M. (2023). NESec: A Modified-UI Honeyword Generation Strategy for Mitigating Targeted Guessing Attacks 2023 7th Cyber Security in Networking Conference (CSNet). 10.1109/CSNet59123.2023.10339786. 979-8-3503-4287-1. (226-232).

    https://ieeexplore.ieee.org/document/10339786/

  • Chakraborty N, Yamout Y and Zulkernine M. (2023). The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords 2023 IEEE Conference on Communications and Network Security (CNS). 10.1109/CNS59707.2023.10288643. 979-8-3503-3945-1. (1-5).

    https://ieeexplore.ieee.org/document/10288643/

  • Chakraborty N, Li J, Leung V, Mondal S, Pan Y, Luo C and Mukherjee M. (2022). Honeyword-based Authentication Techniques for Protecting Passwords: A Survey. ACM Computing Surveys. 55:8. (1-37). Online publication date: 31-Aug-2023.

    https://doi.org/10.1145/3552431

  • Wang K and Reiter M. (2023). Using Amnesia to Detect Credential Database Breaches. Cyber Deception. 10.1007/978-3-031-16613-6_9. (183-215).

    https://link.springer.com/10.1007/978-3-031-16613-6_9

  • Dionysiou A and Athanasopoulos E. (2022). Lethe: Practical Data Breach Detection with Zero Persistent Secret State 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P). 10.1109/EuroSP53844.2022.00022. 978-1-6654-1614-6. (223-235).

    https://ieeexplore.ieee.org/document/9797372/

  • Hong K and Lee B. (2022). A Deep Learning-Based Password Security Evaluation Model. Applied Sciences. 10.3390/app12052404. 12:5. (2404).

    https://www.mdpi.com/2076-3417/12/5/2404

  • Dionysiou A, Vassiliades V and Athanasopoulos E. HoneyGen: Generating Honeywords Using Representation Learning. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. (265-279).

    https://doi.org/10.1145/3433210.3453092

  • Chakraborty N and Mondal S. (2020). On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries. Frontiers of Computer Science: Selected Publications from Chinese Universities. 15:2. Online publication date: 1-Apr-2021.

    https://doi.org/10.1007/s11704-019-9134-9

  • Shi C and Sun H. (2021). HoneyHash: Honeyword Generation Based on Transformed Hashes. Secure IT Systems. 10.1007/978-3-030-70852-8_10. (161-173).

    http://link.springer.com/10.1007/978-3-030-70852-8_10

  • Udenze K and Romeiser S. (2020). Human-in-the-Middle: Increasing Security of Two-Factor Authentication. Human Interaction and Emerging Technologies. 10.1007/978-3-030-25629-6_119. (765-770).

    http://link.springer.com/10.1007/978-3-030-25629-6_119

  • Wang Y, Zhang Z and Chi L. User Account Risk Identification Model for Web Applications. Proceedings of the 2019 5th International Conference on Computer and Technology Applications. (30-34).

    https://doi.org/10.1145/3323933.3324058

  • Chakraborty N and Mondal S. (2019). Towards incorporating honeywords in n‐session recording attack resilient unaided authentication services. IET Information Security. 10.1049/iet-ifs.2017.0538. 13:1. (7-18). Online publication date: 1-Jan-2019.

    https://onlinelibrary.wiley.com/doi/10.1049/iet-ifs.2017.0538

  • Diomedous C and Athanasopoulos E. (2019). Practical Password Hardening Based on TLS. Detection of Intrusions and Malware, and Vulnerability Assessment. 10.1007/978-3-030-22038-9_21. (441-460).

    http://link.springer.com/10.1007/978-3-030-22038-9_21

  • Shen J, Yuen T, Choo K and Zeng Q. (2019). AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords. Information Security and Privacy. 10.1007/978-3-030-21548-4_28. (514-532).

    https://link.springer.com/10.1007/978-3-030-21548-4_28

  • Bermudez Villalva D, Onaolapo J, Stringhini G and Musolesi M. (2018). Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web. Crime Science. 10.1186/s40163-018-0092-6. 7:1. Online publication date: 1-Dec-2018.

    https://crimesciencejournal.springeropen.com/articles/10.1186/s40163-018-0092-6

  • Gruss D, Schwarz M, Wübbeling M, Guggi S, Malderle T, More S and Lipp M. Use-After-FreeMail. Proceedings of the 2018 on Asia Conference on Computer and Communications Security. (297-311).

    https://doi.org/10.1145/3196494.3196514

  • Tzagarakis G, Papadopoulos P, Chariton A, Athanasopoulos E and Markatos E. Øpass. Proceedings of the 11th European Workshop on Systems Security. (1-6).

    https://doi.org/10.1145/3193111.3193113

  • Krawiecka K, Kurnikov A, Paverd A, Mannan M and Asokan N. SafeKeeper. Proceedings of the 2018 World Wide Web Conference. (349-358).

    https://doi.org/10.1145/3178876.3186101

  • Mahmoud K, Mansour K and Makableh A. (2017). Detecting Password File Theft using Predefined Time-Delays between Certain Password Characters. Journal of Telecommunications and Information Technology. 10.26636/jtit.2017.112517. 4:2017. (101-108). Online publication date: 1-Jan-2018.

    http://www.itl.waw.pl/czasopisma/JTIT/2017/4/101.pdf

  • Panda S and Mondal S. (2018). drPass: A Dynamic and Reusable Password Generator Protocol. Information Systems Security. 10.1007/978-3-030-05171-6_21. (407-426).

    http://link.springer.com/10.1007/978-3-030-05171-6_21

  • Trabelsi S and Missaoui C. (2018). Dissuading Stolen Password Reuse. Emerging Technologies for Authorization and Authentication. 10.1007/978-3-030-04372-8_10. (116-128).

    http://link.springer.com/10.1007/978-3-030-04372-8_10

  • Missaoui C, Bachouch S, Abdelkader I and Trabelsi S. (2018). Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures. Cyberspace Safety and Security. 10.1007/978-3-030-01689-0_1. (3-17).

    http://link.springer.com/10.1007/978-3-030-01689-0_1

  • Chakraborty N and Mondal S. (2017). On designing a modified-UI based honeyword generation approach for overcoming the existing limitations. Computers and Security. 66:C. (155-168). Online publication date: 1-May-2017.

    https://doi.org/10.1016/j.cose.2017.01.011

  • Mahmoud K. (2017). Elastic password: A new mechanism for strengthening passwords using time delays between keystrokes 2017 8th International Conference on Information and Communication Systems (ICICS). 10.1109/IACS.2017.7921991. 978-1-5090-4243-2. (316-321).

    http://ieeexplore.ieee.org/document/7921991/

  • Gutierrez C, Almeshekah M, Spafford E, Atallah M and Avery J. (2016). Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords. ACM Transactions on Privacy and Security. 19:3. (1-30). Online publication date: 12-Dec-2016.

    https://doi.org/10.1145/2996457

  • Kumar B and Yadav S. Storageless Credentials And Secure Login. Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. (1-6).

    https://doi.org/10.1145/2905055.2905113

  • Nagar N and Suman U. Two Factor Authentication Using M-Pin Server for Secure Cloud Computing Environment. Web-Based Services. 10.4018/978-1-4666-9466-8.ch046. (1053-1066).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-9466-8.ch046

  • Almeshekah M, Gutierrez C, Atallah M and Spafford E. ErsatzPasswords. Proceedings of the 31st Annual Computer Security Applications Conference. (311-320).

    https://doi.org/10.1145/2818000.2818015

  • Catuogno L, Castiglione A and Palmieri F. (2015). A honeypot system with honeyword-driven fake interactive sessions 2015 International Conference on High Performance Computing & Simulation (HPCS). 10.1109/HPCSim.2015.7237039. 978-1-4673-7812-3. (187-194).

    http://ieeexplore.ieee.org/document/7237039/

  • Petsas T, Tsirantonakis G, Athanasopoulos E and Ioannidis S. Two-factor authentication: is the world ready?. Proceedings of the Eighth European Workshop on System Security. (1-7).

    https://doi.org/10.1145/2751323.2751327

  • Wang Y, Hu M and Li C. (2015). UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. International Conference on Security and Privacy in Communication Networks. 10.1007/978-3-319-23829-6_7. (95-104).

    http://link.springer.com/10.1007/978-3-319-23829-6_7

  • Kumar A and Lauradoux C. (2015). A Survey of Alerting Websites: Risks and Solutions. ICT Systems Security and Privacy Protection. 10.1007/978-3-319-18467-8_9. (126-141).

    http://link.springer.com/10.1007/978-3-319-18467-8_9

  • Nagar N and Suman U. (2014). Two Factor Authentication using M-pin Server for Secure Cloud Computing Environment. International Journal of Cloud Applications and Computing. 4:4. (42-54). Online publication date: 1-Oct-2014.

    https://doi.org/10.4018/ijcac.2014100104