Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
10
TK Electrical engineering. Electronics Nuclear engineering
5
QA76 Computer software
4
Authentication
3
Law
3
Security
3
T Technology (General)
3
Computer networking & communications
2
Computer security
2
Cybersecurity
2
Information technology: general issues
2
Mobile computing
2
Phishing
2
Privacy
2
Privacy by design
2
Production & quality control management
2
5G mobile communication systems
1
Application interfaces
1
Authorized users
1
Banking
1
Banking Systems & Software
1
Banking system of SOA
1
Biometric passport
1
Block cipher algorithms
1
Ciphertexts
1
Classification framework for non-banks
1
Clone cells
1
Collaboration framework
1
Computer crime
1
Computer operating systems
1
-
61
-
62by Madero, Alvaro“..., passwords are the keys to the system. Unfortunately, there has been little innovation and vulnerabilities...”
Published 2014
Get full text
Others -
63by Wu, Jonathan“...Biometrics are a convenient alternative to traditional forms of access control such as passwords...”
Published 2016
Get full text
-
64by Cipresso, Pietro, Gaggioli, Andrea, Serino, Silvia, Cipresso, Sergio, Riva, GiuseppeGet full text
Published 2012-01-01
Article -
65
-
66
-
67
-
68
-
69
-
70by Bulland, Vishal VedprakashSubjects: “...Password cracking...”
Published 2011
Get fulltext
Others -
71“... qualities. In this paper, we designed two password authentication protocols. The security of the protocols...”
Get full text
Others -
72by Horsch, Moritz“..., pictures, and payment information. Passwords are used to protect these data from unauthorized access. User...”
Published 2018
Get full text
Get full text
Others -
73
-
74by Simon Parkinson, Saad Khan, Andrew Crampton, Qing Xu, Weizhi Xie, Na Liu, Kyle Dakin“... authentication mechanism to those involving a shared secret (i.e. a password). Keystroke timings are the focus...”
Published 2021-03-01
Get full text
Article -
75
-
76“...We present in this paper an alternative method for understanding user-chosen passwords. In password...”
Get full text
Article -
77“...This paper presents a novel solution to the age long problem of password security at input level...”
Get full text
Article -
78“...Password authentication is a mechanism used to authenticate user identity over insecure...”
Get full text
Article -
79“... komputerisasi dalam berbagai bidang. Hal ini erat kaitannya dengan penggunaan password dalam area komputerisasi...”
Get full text
Article -
80