Showing 61 - 80 results of 2,583 for search '"password"', query time: 0.78s Refine Results
  1. 61
  2. 62
    by Madero, Alvaro
    Published 2014
    ..., passwords are the keys to the system. Unfortunately, there has been little innovation and vulnerabilities...
    Get full text
    Others
  3. 63
    by Wu, Jonathan
    Published 2016
    ...Biometrics are a convenient alternative to traditional forms of access control such as passwords...
    Get full text
  4. 64
  5. 65
  6. 66
    by Gan, Hock Lai
    Published 2005
    Get fulltext
    Thesis
  7. 67
  8. 68
    by Juels, Ari, Rivest, Ronald L.
    Published 2014
    Get fulltext
    Article
  9. 69
  10. 70
    by Bulland, Vishal Vedprakash
    Published 2011
    Subjects: ...Password cracking...
    Get fulltext
    Others
  11. 71
    by Er-Shuo Zhuang, 莊額碩
    Published 2007
    ... qualities. In this paper, we designed two password authentication protocols. The security of the protocols...
    Get full text
    Others
  12. 72
    by Horsch, Moritz
    Published 2018
    ..., pictures, and payment information. Passwords are used to protect these data from unauthorized access. User...
    Get full text
    Get full text
    Others
  13. 73
  14. 74
    ... authentication mechanism to those involving a shared secret (i.e. a password). Keystroke timings are the focus...
    Get full text
    Article
  15. 75
    by Hazel Murray, David Malone
    Published 2020-03-01
    Subjects: ...passwords...
    Get full text
    Article
  16. 76
    ...We present in this paper an alternative method for understanding user-chosen passwords. In password...
    Get full text
    Article
  17. 77
    by AKINWALE A. Taofiki, IBHARALU F. T.
    Published 2009-12-01
    ...This paper presents a novel solution to the age long problem of password security at input level...
    Get full text
    Article
  18. 78
    ...Password authentication is a mechanism used to authenticate user identity over insecure...
    Get full text
    Article
  19. 79
    ... komputerisasi dalam berbagai bidang. Hal ini erat kaitannya dengan penggunaan password dalam area komputerisasi...
    Get full text
    Article
  20. 80