Showing 1 - 20 results of 2,583 for search '"password"', query time: 1.79s Refine Results
  1. 1
  2. 2
    ...Passwords are still one of the most common means of securing computer systems. Most organizations...
    Get full text
    Others
  3. 3
    by Pyung Kim, Younho Lee, Youn-Sik Hong, Taekyoung Kwon
    Published 2021-01-01
    ...To meet password selection criteria of a server, a user occasionally needs to provide multiple...
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
    by Yong-Xin Zhang, 張永信
    Published 2010
    ...碩士 === 國立中央大學 === 資訊工程研究所 === 98 === How to protect user''s password is a critical issue for any...
    Get full text
    Others
  9. 9
    by Przemysław Rodwald, Bartosz Biernacik
    Published 2018-04-01
    Subjects: ...password...
    Get full text
    Article
  10. 10
    by Crumpacker, John R.
    Published 2012
    ...Approved for public release, distribution unlimited === Password cracking requires significant...
    Get full text
  11. 11
    by Jia-Ge Liu, 劉佳格
    Published 2014
    ... by vocal password recognition. Each password includes four Chinese characters. Once a examinee speaks a...
    Get full text
    Others
  12. 12
    by Weirich, Dirk
    Published 2006
    ...An organization that gives users access to computing resources via a password mechanism needs...
    Get full text
  13. 13
    by Zimmermann, Verena
    Published 2021
    ... unauthorised access. Password authentication still is the most widely used form of authentication despite its...
    Get full text
    Get full text
    Others
  14. 14
    by Aljaffan, Nouf
    Published 2017
    ...Passwords have been dominating user authentication for more than half a century, and many...
    Get full text
  15. 15
    by Samelin, Kai
    Published 2018
    ... number of real-world problems, including secure handling of passwords used for authentication and how...
    Get full text
    Get full text
    Others
  16. 16
  17. 17
  18. 18
  19. 19
    by Beedenbender, Mark G.
    Published 2013
    ... is the password. Passwords are normally composed of a meaningful detail, such as a name of a person or a sequence...
    Get full text
  20. 20
    by Sawyer, Darren Antwon
    Published 2013
    ... for access control to information systems is passwords. Passwords can be machine-generated using a list...
    Get full text