Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
10
TK Electrical engineering. Electronics Nuclear engineering
5
QA76 Computer software
4
Authentication
3
Law
3
Security
3
T Technology (General)
3
Computer networking & communications
2
Computer security
2
Cybersecurity
2
Information technology: general issues
2
Mobile computing
2
Phishing
2
Privacy
2
Privacy by design
2
Production & quality control management
2
5G mobile communication systems
1
Application interfaces
1
Authorized users
1
Banking
1
Banking Systems & Software
1
Banking system of SOA
1
Biometric passport
1
Block cipher algorithms
1
Ciphertexts
1
Classification framework for non-banks
1
Clone cells
1
Collaboration framework
1
Computer crime
1
Computer operating systems
1
-
81
-
82
-
83
-
84
-
85“...碩士 === 輔仁大學 === 資訊工程學系 === 94 === Password authentication is recognized as one of the most cost...”
Get full text
Others -
86“..., we combine electronic voting scheme and memorable password scheme. Even though attacker gets...”
Get full text
Others -
87“...碩士 === 國立中興大學 === 應用數學研究所 === 82 === In this dissertation, a password authentication...”
Get full text
Others -
88by Jiang ShaoquanSubjects: “...password-based key exchange...”
Published 2014-02-01
Get full text
Article -
89“... secret keys to protect the link. There are several modes of Bluetooth pairing, and password-based...”
Get full text
Others -
90“.... For protecting information security, password authentication is used commonly and regard to the easiest and low...”
Get full text
Others -
91“.... Traditional authentication methods such as password system are at risk of offline dictionary attack, phishing...”
Get full text
Others -
92“... Password authentication. This authentication is fragile if someone else gets to know the password...”
Get full text
Others -
93“... passwords is the least expensive solution for user authentication. User-chosen passwords are typically easy...”
Get full text
Others -
94“..., there is a research-worthy issue how to use passwords that people can memorize then easlily as keys...”
Get full text
Others -
95“...'' passwords. Although it has been known that Kerberos is vulnerable to offline attack. Meanwhile,Kerberos uses...”
Get full text
Others -
96“... and passwords for using web-mail, web-ATM, e-Banking service, e-commerce sites, and they usually choosing just...”
Get full text
Others -
97“... important. Server can avoid illegal user with user authentication. A password-based scheme is the most...”
Get full text
Others -
98“... to memorize accounts and passwords for different systems such as financial institutions, E-mail, shopping...”
Get full text
Others -
99“... passwords cracking system used only one computing processing to crack passwords. The algo-rithms...”
Get full text
Others -
100by Althubaiti, Saja“...The aim of this research is to inform the design and usability of password creation systems (PCSs...”
Published 2018
Get full text