Showing 1 - 20 results of 258 for search '"username"', query time: 0.78s Refine Results
  1. 1
    by Burks, Andrea Nia
    Published 2009
    ...USERNAME TAB PASSWORD RETURN Social Networking Site, User Generated Content, Screen Identity...
    Get full text
    Get full text
    Others
  2. 2
    by Quach, Kim
    Published 2018
    ... method of default username and password. This study uses the Mirai attack targeting Dyn in 2016...
    Get full text
    Others
  3. 3
  4. 4
    ... studies (total N = 608) we explored username complexity and trustworthiness of eBay seller profiles. Name...
    Get full text
    Article
  5. 5
    by Magda Lorena Giller Mendoza
    Published 2019-12-01
    Subjects: ...username...
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
    by Wiesław Franciszek Murawiec
    Published 1998-12-01
    Subjects: ... Username Password Remember me Login NOTIFICATIONS View Subscribe LANGUAGE Select LanguageSubmit ARTICLE...
    Get full text
    Article
  13. 13
  14. 14
  15. 15
    by NS Neki
    Published 2016-05-01
    Subjects: ... By Title Other Journals Login Username Password Remember me Journal Content Search Search Scope Browse...
    Get full text
    Article
  16. 16
    by YU-SHENG HSUEH, 薛宇盛
    Published 2010
    ..., and e-Bay, verify users’ identities through logging into the username and password. Once there exists...
    Get full text
    Others
  17. 17
    by Tony Gwyn, Kaushik Roy, Mustafa Atay
    Published 2021-06-01
    ...In the realm of computer security, the username/password standard is becoming increasingly...
    Get full text
    Article
  18. 18
    by Cheng-Huang Jiang, 江檉皇
    Published 2006
    ... of web-based applications. Under the circumstance that the intruder could make use of the username...
    Get full text
    Others
  19. 19
    by Wan-Feng Pan, 潘萬豐
    Published 2011
    ... username and password to do identification and verification, in spite of employing SSL(Secure Sockets Layer...
    Get full text
    Others
  20. 20
    by Iwan Santosa, Dwi Kuswanto
    Published 2016-10-01
    ... mengimplementasikan manajemen resiko didapatkan hasil hanya pada aset username dan password level yang  resikonya High...
    Get full text
    Article