SlideShare a Scribd company logo
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
An Exploration of Geographic Authentication Schemes
Abstract :
We design and explore the usability and security of two geographic authentication
schemes: GeoPass and GeoPass- Notes. GeoPass requires users to choose a place
on a digital map to authenticate with (a location password). GeoPassNotes—an
extension of GeoPass—requires users to annotate their location password with a
sequence of words that they can associate with the location (an annotated location
password). In GeoPassNotes, users are authenticated by correctly entering both a
location and an annotation. We conducted user studies to test the usability and
assess the security of location passwords and annotated location passwords. The
results indicate that both variants are highly memorable, and that annotated
location passwords may be more advantageous than location passwords alone due
to their increased security and the minimal usability impact introduced by the
annotation.
Existing system:
In Existing system we use GeoPass, in which a user chooses a single place on a
digital map as their password. We perform a multi-session in-lab/at-home user
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
study of GeoPass involving 35 users over 8-9 days. Our results suggest that
GeoPass is highly memorable: none of the returning participants forgot their
location passwords after one day. Of the 30 participants who returned to login one
week later, only one participant failed to enter their password. There were very few
failed login attempts throughout the entire study. Our security results suggest that
GeoPass provides enough security to protect against online attacks under simple
system-enforced policies. GeoPass may also be useful as a building block for
future geographic authentication systems.
Disadvantage :
 GeoPass is certainly vulnerable to offline guessing attacks.
 Additionally, GeoPass may offer weak security against online guessing
attacks in some circumstances (e.g., if it is deployed in a small city or if the
adversary had a method of effectively prioritizing guesses). Thus, prudent
implementations of GeoPass should find another way to increase security.
Proposed system:
We propose, implement, and evaluate two systems for geographic authentication:
GeoPass and GeoPassNotes. We evaluate the systems’ security and usability
through two user studies, finding that they both exhibit very strong memorability
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
(over the span of 8-9 days, there were only two resets for GeoPass and none for
GeoPassNotes). Usability was high in terms of there being few failed logins and
user perceptions of the system. Although 67% of the GeoPass users and 80% of
the GeoPassNotes users indicated that they could easily use the system every day,
we must be cautious about recommending their use on frequently used accounts.
Given that the login times for both systems are longer than text passwords, we
suggest they would be most appropriate in contexts where logins occur
infrequently. For example, it might be useful for infrequently used online accounts
or possibly fallback authentication. We found that annotated location passwords
have the potential to be stronger than text passwords against guessing attacks when
proper policies are applied, thus they may be more desirable for higher-security
environments.
Advantages:
 The geographic authentication schemes we explored appear to be
highly memorable
 it would be interesting to explore other ways to harness this
memorability while enhancing security. One interesting direction is to
explore the extent that the presentation effect can improve security in
geographic authentication systems. Another future direction includes
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 4
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
exploring whether the memorability of geographic locations might
translate if used in mnemonics for text passwords.
The GeoPass system. The ―X‖ marker represents the user’s password.
Snapshot of the GeoPassNotes interface during note entry.
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 5
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Hardware Specification :
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech
 Ram : 512 Mb.
 MOBILE : ANDROID
Software Specification :
 Operating system : Windows 7.
 Coding Language : Java 1.7
 Tool Kit : Android 2.3 ABOVE
 IDE : Android Studio
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 6
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Reference :
[1] J. Yan, A. Blackwell, R. Anderson, and A. Grant, ―Password memorability
and security: Empirical results,‖ IEEE Security and Privacy, vol. 2, no. 5, pp. 25–
31, 2004.
[2] R. Veras, C. Collins, and J. Thorpe, ―On the semantic patterns of passwords
and their security impact,‖ in Proceedings of the 21st Annual Network and
Distributed System Security Symposium, ser. NDSS’14, 2014.
[3] J. Bonneau, ―The science of guessing: Analyzing an anonymized corpus of 70
million passwords,‖ in Proceedings of the 2012 IEEE Symposium on Security and
Privacy, ser. SP’12, pp. 538 –552.
[4] P. G. Inglesant and M. A. Sasse, ―The true cost of unusable password policies:
Password use in the wild,‖ in Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, ser. CHI ’10, 2010, pp. 383–392.
[5] S. Schechter, A. J. B. Brush, and S. Egelman, ―It’s no secret. Measuring the
security and reliability of authentication via secret questions,‖ in Proceedings of
the 2009 30th IEEE Symposium on Security and Privacy, ser. SP ’09, 2009, pp.
375–390.

More Related Content

PDF
Investigating the Combination of Text and Graphical Passwords for a more secu...
PDF
Count based hybrid graphical password to prevent brute force attack and shoul...
DOCX
Engineering Project of Venkata Krishna
PPTX
Shoulder Surfing as future technology
PDF
IRJET- Smartphone Sensor based Security Questions and Location
PDF
Color based android shuffling pattern lock
PDF
Keystroke Dynamics Authentication with Project Management System
PDF
Graphical Password Authentication using Images Sequence
Investigating the Combination of Text and Graphical Passwords for a more secu...
Count based hybrid graphical password to prevent brute force attack and shoul...
Engineering Project of Venkata Krishna
Shoulder Surfing as future technology
IRJET- Smartphone Sensor based Security Questions and Location
Color based android shuffling pattern lock
Keystroke Dynamics Authentication with Project Management System
Graphical Password Authentication using Images Sequence

What's hot (20)

PPTX
Multi Factor Authentication using 3D password
PDF
Security Issues and Challenges in Internet of Things – A Review
PDF
A novel multifactor authentication system ensuring usability and security
PDF
Defenses against large scale online password guessing attacks
PPSX
Shoulder surfing resistant graphical and image based login system
PPT
Defenses against large scale online password guessing attacks
PDF
Graphical password authentication using Pass faces
PDF
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
PPTX
Securing online password guessing attack
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
PDF
Graphical Password by Watermarking for security
PDF
IRJET- Two Way Authentication for Banking Systems
PDF
IRJET- Fingerprint based Folder Lock
PDF
Effectiveness of various user authentication techniques
PDF
Iciea08
PDF
IRJET- Password Management Kit for Secure Authentication
PDF
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
PPSX
iKeyPass...Unbreakable Password Security
PDF
Multilevel Security and Authentication System
PPTX
Securing Mobile Cloud Using Fingerprint Authentication
Multi Factor Authentication using 3D password
Security Issues and Challenges in Internet of Things – A Review
A novel multifactor authentication system ensuring usability and security
Defenses against large scale online password guessing attacks
Shoulder surfing resistant graphical and image based login system
Defenses against large scale online password guessing attacks
Graphical password authentication using Pass faces
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
Securing online password guessing attack
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
Graphical Password by Watermarking for security
IRJET- Two Way Authentication for Banking Systems
IRJET- Fingerprint based Folder Lock
Effectiveness of various user authentication techniques
Iciea08
IRJET- Password Management Kit for Secure Authentication
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
iKeyPass...Unbreakable Password Security
Multilevel Security and Authentication System
Securing Mobile Cloud Using Fingerprint Authentication
Ad

Viewers also liked (13)

PPTX
Graphical password authentication
PPTX
Ppt for graphical password authentication using cued click points
PPTX
Ethereum: A decentralized software platform for people and things
PDF
Wave 4 - Power to the People | UM | Social Media Tracker
PDF
การประชุมวิชาการทางสัตวศาสตร์แห่งชาติครั้งที่ ๓
PPTX
Wk2 exploration storyboard
PDF
Bidirectional pwm converter integrating cell voltage equalizer using series r...
PPTX
PDF
Customer Experiences with Soul - Sustainable Cosmetics Keynote
PPTX
Darien Project: Solar Energy in the Wouman Village
PPTX
κώστας
PPTX
Secco @ AppsWorld London Nov 2015
PPTX
Steve jobs
Graphical password authentication
Ppt for graphical password authentication using cued click points
Ethereum: A decentralized software platform for people and things
Wave 4 - Power to the People | UM | Social Media Tracker
การประชุมวิชาการทางสัตวศาสตร์แห่งชาติครั้งที่ ๓
Wk2 exploration storyboard
Bidirectional pwm converter integrating cell voltage equalizer using series r...
Customer Experiences with Soul - Sustainable Cosmetics Keynote
Darien Project: Solar Energy in the Wouman Village
κώστας
Secco @ AppsWorld London Nov 2015
Steve jobs
Ad

Similar to An exploration of geographic authentication scheme (20)

PDF
An exploration of geographic authentication schemes
PDF
DOCX
An exploration of geographic authentication schemes abstract
PDF
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
PDF
Generic Authentication System
PDF
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
PDF
IRJET - Secure Banking Application with Image and GPS Location
PDF
Location based authentication new words approch secuirity
PDF
User Authentication: Passwords and Beyond
RTF
Graphical password minor report
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
PDF
Dr. Ziyad Salloum - Geographical Passwords
DOCX
GRAPHICAL PASSWORD SUFFLELING 2222222222
DOC
graphical password authentical using machine learning document
DOCX
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PDF
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
PPTX
Graphical Password Authentication
PDF
Multilevel authentication using gps and otp techniques
PDF
Multilevel authentication using gps and otp techniques
An exploration of geographic authentication schemes
An exploration of geographic authentication schemes abstract
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Generic Authentication System
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET - Secure Banking Application with Image and GPS Location
Location based authentication new words approch secuirity
User Authentication: Passwords and Beyond
Graphical password minor report
Pass byo bring your own picture for securing graphical passwords
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
Dr. Ziyad Salloum - Geographical Passwords
GRAPHICAL PASSWORD SUFFLELING 2222222222
graphical password authentical using machine learning document
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
Graphical Password Authentication
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques

More from LeMeniz Infotech (20)

PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
PDF
A fast fault tolerant architecture for sauvola local image thresholding algor...
PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
PDF
Interleaved digital power factor correction based on the sliding mode approach
PDF
Bumpless control for reduced thd in power factor correction circuits
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
PDF
A bidirectional three level llc resonant converter with pwam control
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
PDF
Connection of converters to a low and medium power dc network using an induct...
PDF
Stamp enabling privacy preserving location proofs for mobile users
PDF
Sbvlc secure barcode based visible light communication for smartphones
PDF
Read2 me a cloud based reading aid for the visually impaired
PDF
Privacy preserving location sharing services for social networks
PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
PDF
Analyzing ad library updates in android apps
PDF
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
PDF
Context based access control systems for mobile devices
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast fault tolerant architecture for sauvola local image thresholding algor...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
Interleaved digital power factor correction based on the sliding mode approach
Bumpless control for reduced thd in power factor correction circuits
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional three level llc resonant converter with pwam control
Efficient single phase transformerless inverter for grid tied pvg system with...
Highly reliable transformerless photovoltaic inverters with leakage current a...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Delay dependent stability of single-loop controlled grid-connected inverters ...
Connection of converters to a low and medium power dc network using an induct...
Stamp enabling privacy preserving location proofs for mobile users
Sbvlc secure barcode based visible light communication for smartphones
Read2 me a cloud based reading aid for the visually impaired
Privacy preserving location sharing services for social networks
Eplq efficient privacy preserving location-based query over outsourced encryp...
Analyzing ad library updates in android apps
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Context based access control systems for mobile devices

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity
sap open course for s4hana steps from ECC to s4
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectroscopy.pptx food analysis technology

An exploration of geographic authentication scheme

  • 1. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com An Exploration of Geographic Authentication Schemes Abstract : We design and explore the usability and security of two geographic authentication schemes: GeoPass and GeoPass- Notes. GeoPass requires users to choose a place on a digital map to authenticate with (a location password). GeoPassNotes—an extension of GeoPass—requires users to annotate their location password with a sequence of words that they can associate with the location (an annotated location password). In GeoPassNotes, users are authenticated by correctly entering both a location and an annotation. We conducted user studies to test the usability and assess the security of location passwords and annotated location passwords. The results indicate that both variants are highly memorable, and that annotated location passwords may be more advantageous than location passwords alone due to their increased security and the minimal usability impact introduced by the annotation. Existing system: In Existing system we use GeoPass, in which a user chooses a single place on a digital map as their password. We perform a multi-session in-lab/at-home user
  • 2. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com study of GeoPass involving 35 users over 8-9 days. Our results suggest that GeoPass is highly memorable: none of the returning participants forgot their location passwords after one day. Of the 30 participants who returned to login one week later, only one participant failed to enter their password. There were very few failed login attempts throughout the entire study. Our security results suggest that GeoPass provides enough security to protect against online attacks under simple system-enforced policies. GeoPass may also be useful as a building block for future geographic authentication systems. Disadvantage :  GeoPass is certainly vulnerable to offline guessing attacks.  Additionally, GeoPass may offer weak security against online guessing attacks in some circumstances (e.g., if it is deployed in a small city or if the adversary had a method of effectively prioritizing guesses). Thus, prudent implementations of GeoPass should find another way to increase security. Proposed system: We propose, implement, and evaluate two systems for geographic authentication: GeoPass and GeoPassNotes. We evaluate the systems’ security and usability through two user studies, finding that they both exhibit very strong memorability
  • 3. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com (over the span of 8-9 days, there were only two resets for GeoPass and none for GeoPassNotes). Usability was high in terms of there being few failed logins and user perceptions of the system. Although 67% of the GeoPass users and 80% of the GeoPassNotes users indicated that they could easily use the system every day, we must be cautious about recommending their use on frequently used accounts. Given that the login times for both systems are longer than text passwords, we suggest they would be most appropriate in contexts where logins occur infrequently. For example, it might be useful for infrequently used online accounts or possibly fallback authentication. We found that annotated location passwords have the potential to be stronger than text passwords against guessing attacks when proper policies are applied, thus they may be more desirable for higher-security environments. Advantages:  The geographic authentication schemes we explored appear to be highly memorable  it would be interesting to explore other ways to harness this memorability while enhancing security. One interesting direction is to explore the extent that the presentation effect can improve security in geographic authentication systems. Another future direction includes
  • 4. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 4 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com exploring whether the memorability of geographic locations might translate if used in mnemonics for text passwords. The GeoPass system. The ―X‖ marker represents the user’s password. Snapshot of the GeoPassNotes interface during note entry.
  • 5. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 5 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Hardware Specification :  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech  Ram : 512 Mb.  MOBILE : ANDROID Software Specification :  Operating system : Windows 7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Android Studio
  • 6. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 6 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Reference : [1] J. Yan, A. Blackwell, R. Anderson, and A. Grant, ―Password memorability and security: Empirical results,‖ IEEE Security and Privacy, vol. 2, no. 5, pp. 25– 31, 2004. [2] R. Veras, C. Collins, and J. Thorpe, ―On the semantic patterns of passwords and their security impact,‖ in Proceedings of the 21st Annual Network and Distributed System Security Symposium, ser. NDSS’14, 2014. [3] J. Bonneau, ―The science of guessing: Analyzing an anonymized corpus of 70 million passwords,‖ in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP’12, pp. 538 –552. [4] P. G. Inglesant and M. A. Sasse, ―The true cost of unusable password policies: Password use in the wild,‖ in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI ’10, 2010, pp. 383–392. [5] S. Schechter, A. J. B. Brush, and S. Egelman, ―It’s no secret. Measuring the security and reliability of authentication via secret questions,‖ in Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, ser. SP ’09, 2009, pp. 375–390.