Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
10
TK Electrical engineering. Electronics Nuclear engineering
5
QA76 Computer software
4
Authentication
3
Law
3
Security
3
T Technology (General)
3
Computer networking & communications
2
Computer security
2
Cybersecurity
2
Information technology: general issues
2
Mobile computing
2
Phishing
2
Privacy
2
Privacy by design
2
Production & quality control management
2
5G mobile communication systems
1
Application interfaces
1
Authorized users
1
Banking
1
Banking Systems & Software
1
Banking system of SOA
1
Biometric passport
1
Block cipher algorithms
1
Ciphertexts
1
Classification framework for non-banks
1
Clone cells
1
Collaboration framework
1
Computer crime
1
Computer operating systems
1
-
1
-
2
Get full text
Others -
3“...To meet password selection criteria of a server, a user occasionally needs to provide multiple...”
Get full text
Article -
4
-
5
-
6
-
7
-
8“...碩士 === 國立中央大學 === 資訊工程研究所 === 98 === How to protect user''s password is a critical issue for any...”
Get full text
Others -
9
-
10by Crumpacker, John R.“...Approved for public release, distribution unlimited === Password cracking requires significant...”
Published 2012
Get full text
-
11“... by vocal password recognition. Each password includes four Chinese characters. Once a examinee speaks a...”
Get full text
Others -
12by Weirich, Dirk“...An organization that gives users access to computing resources via a password mechanism needs...”
Published 2006
Get full text
-
13by Zimmermann, Verena“... unauthorised access. Password authentication still is the most widely used form of authentication despite its...”
Published 2021
Get full text
Get full text
Others -
14by Aljaffan, Nouf“...Passwords have been dominating user authentication for more than half a century, and many...”
Published 2017
Get full text
-
15by Samelin, Kai“... number of real-world problems, including secure handling of passwords used for authentication and how...”
Published 2018
Get full text
Get full text
Others -
16
-
17
-
18
-
19by Beedenbender, Mark G.“... is the password. Passwords are normally composed of a meaningful detail, such as a name of a person or a sequence...”
Published 2013
Get full text
-
20by Sawyer, Darren Antwon“... for access control to information systems is passwords. Passwords can be machine-generated using a list...”
Published 2013
Get full text