Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
10
TK Electrical engineering. Electronics Nuclear engineering
5
QA76 Computer software
4
Authentication
3
Law
3
Security
3
T Technology (General)
3
Computer networking & communications
2
Computer security
2
Cybersecurity
2
Information technology: general issues
2
Mobile computing
2
Phishing
2
Privacy
2
Privacy by design
2
Production & quality control management
2
5G mobile communication systems
1
Application interfaces
1
Authorized users
1
Banking
1
Banking Systems & Software
1
Banking system of SOA
1
Biometric passport
1
Block cipher algorithms
1
Ciphertexts
1
Classification framework for non-banks
1
Clone cells
1
Collaboration framework
1
Computer crime
1
Computer operating systems
1
-
21by 李尚宸“...碩士 === 國立交通大學 === 資訊科學系所 === 92 === We know that password-based schemes must be able to against...”
Published 2004
Get full text
Others -
22“.../Password to facilitate memory is the majority tendency. The poor user habit makes most of the Account...”
Get full text
Others -
23by Sirapat Boonkrong, Arkalerk Kitthimon, Patchara Koksoungnoen, Krissada JenprakhonSubjects: “...password...”
Published 2021-08-01
Get full text
Article -
24by Brostoff, Alexander“...As computers reach more aspects of our everyday life, so too do the passwords that keep them secure...”
Published 2005
Get full text
-
25by Burks, Andrea Nia“...USERNAME TAB PASSWORD RETURN Social Networking Site, User Generated Content, Screen Identity...”
Published 2009
Get full text
Get full text
Others -
26by Kiefer, Franziskus“...Password-based authentication is the most popular authentication mechanism for humans today...”
Published 2016
Get full text
-
27“...Publisher version === Conventional (text-based) passwords have shown patterns such as variations...”
Get full text
Get full text
Others -
28“...碩士 === 國立臺中教育大學 === 資訊工程學系 === 107 === Textual password has been widely used for user...”
Get full text
Others -
29“...In the field of information security, passwords are a means of authenticating users. Passwords...”
Get full text
Article -
30“...博士 === 輔仁大學 === 應用科學與工程研究所博士班 === 98 === Password authentication scheme is probably the most widely...”
Get full text
Others -
31by Friedman, BrandonSubjects: “...Computers -- Access control -- Passwords...”
Published 2014
Get full text
Others -
32by Khorsravi Joashaghani, Mohammadmahdi“...The ability to recover passwords is an important step in red-teaming and penetration testing...”
Published 2020
Get full text
Others -
33“...碩士 === 國立中央大學 === 資訊工程研究所 === 96 === In the dynamic password authentication schemes, user''s login...”
Get full text
Others -
34
-
35“... the screenplay, " Remerbering Password ", in which it includes various fundamental concepts and theories...”
Get full text
Others -
36by Van Der Horst, Timothy W.Subjects: “...passwords...”
Published 2010
Get full text
Get full text
Others -
37
-
38by Harding, Andrew S.“... Passwords (WARP) mitigates authentication woes by providing usable mechanisms for both administrators...”
Published 2008
Get full text
Get full text
Others -
39by Li, Yue“...Password has been the dominant authentication scheme for more than 30 years...”
Published 2019
Get full text
Get full text
Others -
40