Showing 181 - 200 results of 2,583 for search '"password"', query time: 1.09s Refine Results
  1. 181
  2. 182
  3. 183
    by Zakaria, Nur Haryani Binti
    Published 2013
    ... users’ behaviour in the domain of password authentication. The thesis is comprised of two parts. Part 1...
    Get full text
  4. 184
  5. 185
    by Yu Chieh Chen, 陳郁潔
    Published 2009
    ...碩士 === 長庚大學 === 資訊管理學研究所 === 97 === With more and more use of authentication systems, the passwords...
    Get full text
    Others
  6. 186
    by Chi-wen Chen, 陳麒文
    Published 2010
    ... password authentication scheme using smart cards. The authentication scheme of Liu et al. tried to prevent...
    Get full text
    Others
  7. 187
    by Chung-Fa Lai, 賴俊發
    Published 2011
    ... with a password table and claimed that the proposed mechanism is still secure even though an attacker...
    Get full text
    Others
  8. 188
  9. 189
    by P. Pandey
    Published 2019-12-01
    Subjects: ...graphical password...
    Get full text
    Article
  10. 190
    by Chih-yuan Huang, 黃誌源
    Published 2012
    ... appeared for protection. Nowadays, using an alphanumeric password for authentication to access cloud...
    Get full text
    Others
  11. 191
    by Yung-Chuan Wu, 吳永川
    Published 2006
    ... is fair to users. When a user''s password can''t get authenticated, the system is able to make a further...
    Get full text
    Others
  12. 192
    by Rui-Hong Sun, 孫瑞鴻
    Published 2014
    .... At first, the user must input the correct graphic password to access Imageshare1, and then activate...
    Get full text
    Others
  13. 193
  14. 194
    by Hui-ling Cheng, 鄭惠菱
    Published 2006
    ... in distributed network. In this research, the main direction is password authentication mechanism. There are two...
    Get full text
    Others
  15. 195
    by Yi-Pin Liao, 廖一評
    Published 2009
    ...). Password authenticated key exchange (PAKE) is the most suitable mechanism due to the advantage...
    Get full text
    Others
  16. 196
    by Shen-Tien Chang, 張申典
    Published 2005
    ...碩士 === 輔仁大學 === 資訊工程學系 === 93 === Nowadays, password authentication is still one of the most widely...
    Get full text
    Others
  17. 197
  18. 198
    by Huang Ching-Chou, 黃經州
    Published 2006
    ...碩士 === 南台科技大學 === 多媒體與電腦娛樂科學研究所 === 94 === Using the proposed time-based password mechanism within...
    Get full text
    Others
  19. 199
    by Dong-Lin Wu, 吳東霖
    Published 2013
    ..., Trojans, Phishing, spyware, brute and son on made great progress, the password authentication isn’t secure...
    Get full text
    Others
  20. 200