Showing 21 - 40 results of 2,583 for search '"password"', query time: 1.34s Refine Results
  1. 21
    by 李尚宸
    Published 2004
    ...碩士 === 國立交通大學 === 資訊科學系所 === 92 === We know that password-based schemes must be able to against...
    Get full text
    Others
  2. 22
    by Wen-Chun Hsieh, 謝文均
    Published 2007
    .../Password to facilitate memory is the majority tendency. The poor user habit makes most of the Account...
    Get full text
    Others
  3. 23
  4. 24
    by Brostoff, Alexander
    Published 2005
    ...As computers reach more aspects of our everyday life, so too do the passwords that keep them secure...
    Get full text
  5. 25
    by Burks, Andrea Nia
    Published 2009
    ...USERNAME TAB PASSWORD RETURN Social Networking Site, User Generated Content, Screen Identity...
    Get full text
    Get full text
    Others
  6. 26
    by Kiefer, Franziskus
    Published 2016
    ...Password-based authentication is the most popular authentication mechanism for humans today...
    Get full text
  7. 27
    ...Publisher version === Conventional (text-based) passwords have shown patterns such as variations...
    Get full text
    Get full text
    Others
  8. 28
    by CHANG, WEI-LI, 張維里
    Published 2019
    ...碩士 === 國立臺中教育大學 === 資訊工程學系 === 107 === Textual password has been widely used for user...
    Get full text
    Others
  9. 29
    by Ki Hyeon Hong, Un Gu Kang, Byung Mun Lee
    Published 2021-01-01
    ...In the field of information security, passwords are a means of authenticating users. Passwords...
    Get full text
    Article
  10. 30
    by Maw-Jinn Tsaur, 曹茂勁
    Published 2010
    ...博士 === 輔仁大學 === 應用科學與工程研究所博士班 === 98 === Password authentication scheme is probably the most widely...
    Get full text
    Others
  11. 31
  12. 32
    ...The ability to recover passwords is an important step in red-teaming and penetration testing...
    Get full text
    Others
  13. 33
    by Hsi-Chang Shih, 施錫彰
    Published 2008
    ...碩士 === 國立中央大學 === 資訊工程研究所 === 96 === In the dynamic password authentication schemes, user''s login...
    Get full text
    Others
  14. 34
    by Dupont, Pierre-Alain
    Published 2018
    Subjects: ...Fuzzy password...
    Get full text
  15. 35
    by Hsiao, Cheng–Hsiung, 蕭正雄
    Published 2014
    ... the screenplay, " Remerbering Password ", in which it includes various fundamental concepts and theories...
    Get full text
    Others
  16. 36
  17. 37
    by Lundberg, Tobias
    Published 2019
    Subjects: ...password guessing...
    Get full text
    Others
  18. 38
    by Harding, Andrew S.
    Published 2008
    ... Passwords (WARP) mitigates authentication woes by providing usable mechanisms for both administrators...
    Get full text
    Get full text
    Others
  19. 39
    by Li, Yue
    Published 2019
    ...Password has been the dominant authentication scheme for more than 30 years...
    Get full text
    Get full text
    Others
  20. 40
    Subjects: ...dynamic graphical passwords...
    Get full text
    Article