Kävrestad, Joakim; Lennartsson, Markus; Birath, Marcus; … - In: Information & Computer Security 28 (2020) 5, pp. 701-717
authentication methods are in existence, using passwords remain the most common type of authentication. As long and complex passwords … are encouraged by research studies and practitioners alike, computer users design passwords using strategies that enable … them to remember their passwords. This paper aims to find strategies that allow for the generation of passwords that are …