Works matching DE "COMPUTER passwords"
Results: 951
User authentication method based on keystroke dynamics and mouse dynamics using HDA.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 2, p. 653, doi. 10.1007/s00530-022-00997-5
- By:
- Publication type:
- Article
A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity.
- Published in:
- Wireless Personal Communications, 2019, v. 109, n. 3, p. 1911, doi. 10.1007/s11277-019-06659-6
- By:
- Publication type:
- Article
Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 3, p. 1243, doi. 10.1007/s11277-019-06211-6
- By:
- Publication type:
- Article
A Novel Threshold Cryptography with Membership Authentication and Key Establishment.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 3943, doi. 10.1007/s11277-017-4708-z
- By:
- Publication type:
- Article
Secure Data Access and Sharing Scheme for Cloud Storage.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5295, doi. 10.1007/s11277-016-3742-6
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 4629, doi. 10.1007/s11277-017-4408-8
- By:
- Publication type:
- Article
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2785, doi. 10.1007/s11277-017-3961-5
- By:
- Publication type:
- Article
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 3185, doi. 10.1007/s11277-017-3990-0
- By:
- Publication type:
- Article
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 3391, doi. 10.1007/s11277-017-4003-z
- By:
- Publication type:
- Article
User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 1, p. 67, doi. 10.1007/s11277-016-3595-z
- By:
- Publication type:
- Article
An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 1, p. 217, doi. 10.1007/s11277-016-3342-5
- By:
- Publication type:
- Article
Design and Analysis of a Provably Secure Multi-server Authentication Scheme.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 3, p. 1095, doi. 10.1007/s11277-015-2975-0
- By:
- Publication type:
- Article
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 1, p. 225, doi. 10.1007/s11277-015-2735-1
- By:
- Publication type:
- Article
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 1, p. 263, doi. 10.1007/s11277-015-2737-z
- By:
- Publication type:
- Article
Editorial: Special Issue on 'Recent Advances in Mobile and Wireless Networks'.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
Analysis and Improvement of a Robust Smart Card Based-Authentication Scheme for Multi-Server Architecture.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 1, p. 475, doi. 10.1007/s11277-014-1762-7
- By:
- Publication type:
- Article
A Time and Location Information Assisted OTP Scheme.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 1, p. 509, doi. 10.1007/s11277-013-1026-y
- By:
- Publication type:
- Article
A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks.
- Published in:
- Wireless Personal Communications, 2013, v. 71, n. 3, p. 1977, doi. 10.1007/s11277-012-0918-6
- By:
- Publication type:
- Article
A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags.
- Published in:
- Wireless Personal Communications, 2011, v. 59, n. 1, p. 27, doi. 10.1007/s11277-010-0187-1
- By:
- Publication type:
- Article
PROGRAMA DE CONSCIENTIZAÇÃO COMO ESTRATÉGIA PARA COMBATER ATAQUES DE ENGENHARIA SOCIAL NO AMBIENTE CORPORATIVO.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 11, p. 1, doi. 10.54751/revistafoco.v16n11-086
- By:
- Publication type:
- Article
SOFT BIOMETRIC AUTHENTICATION.
- Published in:
- Knowledge: International Journal, 2023, v. 58, n. 3, p. 481
- By:
- Publication type:
- Article
Navigating the Cybersecurity Landscape.
- Published in:
- Journal: American Water Works Association, 2024, v. 116, n. 7, p. 50, doi. 10.1002/awwa.2320
- By:
- Publication type:
- Article
Examining the Authentication of a user using 3D Password.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 5, p. 6566
- By:
- Publication type:
- Article
Continuous user Authentication through Keystroke Dynamics.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 5, p. 5801
- By:
- Publication type:
- Article
Identification of Phony Profiles on Social Platforms using Random Forest and Decision Tree Algorithms.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 5714
- By:
- Publication type:
- Article
Enhancement of Security and Performance in Cryptography during Implication of Intrusion Detection System.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 5470
- By:
- Publication type:
- Article
Implementing a Robust Framework for Access Control and Identity Management.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4269
- By:
- Publication type:
- Article
A Review on Nonvocal Password Recognition using Lip analysis Strategy.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3990
- By:
- Publication type:
- Article
D- Protect: A Decentralized Personal Information Vault.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3073
- By:
- Publication type:
- Article
Detection of Phishing Websites using Machine Learning Algorithm.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 962
- By:
- Publication type:
- Article
Alerting System using Honeyword.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2979
- By:
- Publication type:
- Article
Dictionary List Creation using Web Scrapping and Password Cracking.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2973
- By:
- Publication type:
- Article
Electronic Products Marketing Store Application Design.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2457
- By:
- Publication type:
- Article
Practical Authentication Mechanism using PassText and OTP.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 3, p. 132
- By:
- Publication type:
- Article
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
- Published in:
- Information Technology & Control, 2018, v. 47, n. 2, p. 275, doi. 10.5755/j01.itc.47.2.16397
- By:
- Publication type:
- Article
An Improvement on Remote User Authentication Schemes Using Smart Cards.
- Published in:
- Computers (2073-431X), 2018, v. 7, n. 1, p. 9, doi. 10.3390/computers7010009
- By:
- Publication type:
- Article
A new ownership transfer protocol with optional mode for RFID tags.
- Published in:
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 5, p. 52, doi. 10.3969/j.issn.2095-476X.2014.05.012
- By:
- Publication type:
- Article
Telehealth in oncofertility and breast cancer patients during COVID-19: preliminary results of insenoallasalute.it project.
- Published in:
- European Review for Medical & Pharmacological Sciences, 2023, v. 27, n. 11, p. 5327
- By:
- Publication type:
- Article
A service-categorized security scheme with physical unclonable functions for internet of vehicles.
- Published in:
- Journal of Big Data, 2023, v. 10, n. 1, p. 1, doi. 10.1186/s40537-023-00865-7
- By:
- Publication type:
- Article
Role of authentication factors in Fin-tech mobile transaction security.
- Published in:
- Journal of Big Data, 2023, v. 10, n. 1, p. 1, doi. 10.1186/s40537-023-00807-3
- By:
- Publication type:
- Article
Security Once Afforded by Passwords "Weakened".
- Published in:
- Document News, 2012, v. 30, n. 5/6, p. 11
- Publication type:
- Article
Pixel Value Graphical Password Scheme: Analysis on Time Complexity performance of Clustering Algorithm for Passpix Segmentation.
- Published in:
- Journal of Engineering & Technological Sciences, 2023, v. 55, n. 1, p. 52, doi. 10.5614/j.eng.technol.sci.2023.55.1.6
- By:
- Publication type:
- Article
ВИКОРИСТАННЯ МЕНЕДЖЕРА ПАРОЛІВ KEEPASS ДЛЯ ЗАБЕЗПЕЧЕННЯ ЗАХИЩЕНОСТІ ДАНИХ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 2, p. 324, doi. 10.18372/2225-5036.30.19245
- By:
- Publication type:
- Article
ДОСЛІДЖЕННЯ БЕЗПЕКИ СТАНДАРТУ WI-FI PROTECTED ACCESS 3 (WPA3).
- Published in:
- Ukrainian Scientific Journal of Information Security, 2023, v. 29, n. 1, p. 21, doi. 10.18372/2225-5036.29.17549
- By:
- Publication type:
- Article
РОЗСЛІДУВАННЯ КІБЕРЗЛОЧИНІВ ЗА ДОПОМОГОЮ ПРИМАНОК У ХМАРНОМУ СЕРЕДОВИЩІ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2021, v. 27, n. 1, p. 20, doi. 10.18372/2225-5036.26.15574
- By:
- Publication type:
- Article
ВИБІР РАЦІОНАЛЬНОГО СПОСОБУ ГЕНЕРУВАННЯ ПАРОЛІВ СЕРЕД МНОЖИНИ ІСНУЮЧИХ
- Published in:
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 1, p. 59, doi. 10.18372/2225-5036.25.13668
- By:
- Publication type:
- Article
Top 5 Tips to Strengthen Security Awareness and Protect Your Business.
- Published in:
- Veterinary Ireland Journal, 2024, v. 14, n. 3, p. 130
- By:
- Publication type:
- Article
Protect your practice: cyber security tips.
- Published in:
- Veterinary Ireland Journal, 2022, v. 12, n. 10, p. 572
- By:
- Publication type:
- Article
Effects of Password Type and Memory Techniques on User Password Memory.
- Published in:
- Psi Chi Journal of Psychological Research, 2016, v. 21, n. 4, p. 269, doi. 10.24839/b21.4.269
- By:
- Publication type:
- Article
Fingerprint Sequencing: An Authentication Mechanism that Integrates Fingerprints and a Knowledge-based Methodology to Promote Security and Usability.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 3, p. 14233, doi. 10.48084/etasr.7250
- By:
- Publication type:
- Article