Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
10
TK Electrical engineering. Electronics Nuclear engineering
5
QA76 Computer software
4
Authentication
3
Law
3
Security
3
T Technology (General)
3
Computer networking & communications
2
Computer security
2
Cybersecurity
2
Information technology: general issues
2
Mobile computing
2
Phishing
2
Privacy
2
Privacy by design
2
Production & quality control management
2
5G mobile communication systems
1
Application interfaces
1
Authorized users
1
Banking
1
Banking Systems & Software
1
Banking system of SOA
1
Biometric passport
1
Block cipher algorithms
1
Ciphertexts
1
Classification framework for non-banks
1
Clone cells
1
Collaboration framework
1
Computer crime
1
Computer operating systems
1
-
181
-
182
-
183by Zakaria, Nur Haryani Binti“... users’ behaviour in the domain of password authentication. The thesis is comprised of two parts. Part 1...”
Published 2013
Get full text
-
184
-
185“...碩士 === 長庚大學 === 資訊管理學研究所 === 97 === With more and more use of authentication systems, the passwords...”
Get full text
Others -
186“... password authentication scheme using smart cards. The authentication scheme of Liu et al. tried to prevent...”
Get full text
Others -
187“... with a password table and claimed that the proposed mechanism is still secure even though an attacker...”
Get full text
Others -
188
-
189
-
190“... appeared for protection. Nowadays, using an alphanumeric password for authentication to access cloud...”
Get full text
Others -
191“... is fair to users. When a user''s password can''t get authenticated, the system is able to make a further...”
Get full text
Others -
192“.... At first, the user must input the correct graphic password to access Imageshare1, and then activate...”
Get full text
Others -
193
-
194“... in distributed network. In this research, the main direction is password authentication mechanism. There are two...”
Get full text
Others -
195“...). Password authenticated key exchange (PAKE) is the most suitable mechanism due to the advantage...”
Get full text
Others -
196“...碩士 === 輔仁大學 === 資訊工程學系 === 93 === Nowadays, password authentication is still one of the most widely...”
Get full text
Others -
197by Miceli, ChristopherSubjects: “...one-time password...”
Published 2011
Get full text
Get full text
Others -
198“...碩士 === 南台科技大學 === 多媒體與電腦娛樂科學研究所 === 94 === Using the proposed time-based password mechanism within...”
Get full text
Others -
199“..., Trojans, Phishing, spyware, brute and son on made great progress, the password authentication isn’t secure...”
Get full text
Others -
200by Golrang, Mohammad SalehSubjects: “...Password Managers...”
Published 2012
Get full text
Get full text