Showing 81 - 100 results of 2,583 for search '"password"', query time: 0.75s Refine Results
  1. 81
  2. 82
  3. 83
  4. 84
  5. 85
    by Chen Hsi-Hung, 陳溪泓
    Published 2006
    ...碩士 === 輔仁大學 === 資訊工程學系 === 94 === Password authentication is recognized as one of the most cost...
    Get full text
    Others
  6. 86
    by Cheng-Wei Chang, 張政偉
    Published 2004
    ..., we combine electronic voting scheme and memorable password scheme. Even though attacker gets...
    Get full text
    Others
  7. 87
    by Yih-Shyan Hwang, 黃議賢
    Published 1994
    ...碩士 === 國立中興大學 === 應用數學研究所 === 82 === In this dissertation, a password authentication...
    Get full text
    Others
  8. 88
    by Jiang Shaoquan
    Published 2014-02-01
    Subjects: ...password-based key exchange...
    Get full text
    Article
  9. 89
    by Fan, Chia-Ming, 范家銘
    Published 2009
    ... secret keys to protect the link. There are several modes of Bluetooth pairing, and password-based...
    Get full text
    Others
  10. 90
    by Lin Sheng-Fang, 林勝芳
    Published 2005
    .... For protecting information security, password authentication is used commonly and regard to the easiest and low...
    Get full text
    Others
  11. 91
    by Chia-Cheng Yao, 姚佳政
    Published 2011
    .... Traditional authentication methods such as password system are at risk of offline dictionary attack, phishing...
    Get full text
    Others
  12. 92
    by Yuan-Chih Hu, 胡源智
    Published 2007
    ... Password authentication. This authentication is fragile if someone else gets to know the password...
    Get full text
    Others
  13. 93
    by Chun-Li Lin, 林峻立
    Published 2003
    ... passwords is the least expensive solution for user authentication. User-chosen passwords are typically easy...
    Get full text
    Others
  14. 94
    by Te-Ching Chang, 張德竟
    Published 2001
    ..., there is a research-worthy issue how to use passwords that people can memorize then easlily as keys...
    Get full text
    Others
  15. 95
    by Li-Chin Chou, 周利欽
    Published 2000
    ...'' passwords. Although it has been known that Kerberos is vulnerable to offline attack. Meanwhile,Kerberos uses...
    Get full text
    Others
  16. 96
    by Chang-Chi Chen, 陳昌琪
    Published 2008
    ... and passwords for using web-mail, web-ATM, e-Banking service, e-commerce sites, and they usually choosing just...
    Get full text
    Others
  17. 97
    by Chiang-Jiun Shie, 謝鉛俊
    Published 2005
    ... important. Server can avoid illegal user with user authentication. A password-based scheme is the most...
    Get full text
    Others
  18. 98
    by Bo-sin Wu, 吳柏欣
    Published 2013
    ... to memorize accounts and passwords for different systems such as financial institutions, E-mail, shopping...
    Get full text
    Others
  19. 99
    by CHIANG,YU-PING, 江宇平
    Published 2016
    ... passwords cracking system used only one computing processing to crack passwords. The algo-rithms...
    Get full text
    Others
  20. 100
    by Althubaiti, Saja
    Published 2018
    ...The aim of this research is to inform the design and usability of password creation systems (PCSs...
    Get full text