Works matching DE "COMPUTER password security"
2
- International Journal of Image & Graphics, 2018, v. 18, n. 1, p. -1, doi. 10.1142/S0219467818500067
- Choudhury, Bismita;
- Then, Patrick;
- Issac, Biju;
- Raman, Valliappan;
- Haldar, Manas Kumar
- Article
3
- ISSA Journal, 2020, v. 18, n. 6, p. 7
- Article
4
- ISSA Journal, 2019, v. 17, n. 5, p. 12
- Article
5
- Journal of Intelligent Systems, 2020, v. 29, n. 1, p. 1626, doi. 10.1515/jisys-2018-0479
- Shyla, S. Immaculate;
- Sujatha, S.S.
- Article
6
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5563884
- Shi, Ruixin;
- Zhou, Yongbin;
- Li, Yong;
- Han, Weili
- Article
7
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6613392
- Fan, Jia;
- Qiao, Lanfei;
- Cao, Yunfei;
- Liu, Shanglin;
- Zhang, Wenke;
- Tang, Lin
- Article
8
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6653076
- Article
9
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6653076
- Article
10
- Electronic Journal of Computer Science & Information Technology, 2015, v. 5, n. 1, p. 13
- Article
11
- Symmetry (20738994), 2016, v. 8, n. 11, p. 131, doi. 10.3390/sym8110131
- Jie Zhang;
- Xin Huang;
- Craig, Paul;
- Marshall, Alan;
- Dawei Liu
- Article
12
- Electronics Letters (Wiley-Blackwell), 2019, v. 55, n. 22, p. 1201, doi. 10.1049/el.2019.2334
- Refaey, A.;
- Sallam, A.;
- Shami, A.
- Article
13
- BVICAM's International Journal of Information Technology, 2016, v. 8, n. 1, p. 959
- Sriharsha, B. S.;
- Zabiullah;
- Vishnu, S. B.;
- Sanju, V.
- Article
14
- Computer Journal, 2017, v. 60, n. 12, p. 1912, doi. 10.1093/comjnl/bxx078
- FIORE, DARIO;
- GONZÁLEZ VASCO, MARÍA ISABEL;
- SORIENTE, CLAUDIO
- Article
15
- British Journal of Criminology, 2015, v. 55, n. 3, p. 615, doi. 10.1093/bjc/azu104
- MAIMON, DAVID;
- WILSON, THEODORE;
- RENAND, WULING;
- BERENBLUM, TAMAR
- Article
16
- Telkomnika, 2019, v. 17, n. 2, p. 745, doi. 10.12928/TELKOMNIKA.v17i2.11775
- Harianto, Hansen Edrick;
- Gunawan, Dennis
- Article
17
- Telkomnika, 2019, v. 17, n. 2, p. 826, doi. 10.12928/TELKOMNIKA.v17i2.11754
- Kusnardi, Kevin;
- Gunawan, Dennis
- Article
18
- Telkomnika, 2018, v. 16, n. 6, p. 2643, doi. 10.12928/TELKOMNIKA.v16i6.10437
- Aramice, Gregor Alexander;
- Jaafar Qassim Kadhim
- Article
19
- Telkomnika, 2018, v. 16, n. 2, p. 755, doi. 10.12928/TELKOMNIKA.v16i2.7572
- Martin, Magdin;
- Štefan, Koprda;
- Ľubor, Ferenczy
- Article
20
- Computers, Materials & Continua, 2020, v. 65, n. 1, p. 153, doi. 10.32604/cmc.2020.011293
- Gyeong-Jin Ra;
- Chang-Hyun Roh;
- Im-Yeong Lee
- Article
21
- Computers, Materials & Continua, 2020, v. 63, n. 2, p. 663, doi. 10.32604/cmc.2020.06565
- Zengpeng Li;
- Jiuru Wang;
- Chang Choi;
- Wenyin Zhang
- Article
22
- Computers, Materials & Continua, 2019, v. 59, n. 1, p. 181, doi. 10.32604/cmc.2019.05813
- Wen Zhang;
- Keyue Li;
- Tianyang Li;
- Shaozhang Niu;
- Zhenguang Gao
- Article
23
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 491
- Article
24
- Contract Management, 2015, v. 55, n. 8, p. 58
- Article
25
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- Dmitrienko, Alexandra;
- Liebchen, Christopher;
- Rossow, Christian;
- Sadeghi, Ahmad-Reza
- Article
26
- IETE Technical Review, 2014, v. 31, n. 1, p. 82, doi. 10.1080/02564602.2014.891382
- Abdalla, Al-kindy Athman;
- Pathan, Al-Sakib Khan
- Article
27
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 1, p. 59, doi. 10.18372/2225-5036.25.13668
- Бурячок, Володимир;
- Платоненко, Артем;
- Семко, Олексій
- Article
28
- Computer Law Review International, 2020, v. 21, n. 3, p. 89, doi. 10.9785/cri-2020-210307
- Article
29
- Applied Sciences (2076-3417), 2020, v. 10, n. 20, p. 7306, doi. 10.3390/app10207306
- Nam, Sungyup;
- Jeon, Seungho;
- Moon, Jongsub
- Article
30
- Applied Sciences (2076-3417), 2020, v. 10, n. 6, p. 1962, doi. 10.3390/app10061962
- Choi, Jusop;
- Cho, Junsung;
- Kim, Hyoungshick;
- Hyun, Sangwon
- Article
31
- Applied Sciences (2076-3417), 2020, v. 10, n. 4, p. 1286, doi. 10.3390/app10041286
- Lee, Kyungroul;
- Yim, Kangbin
- Article
32
- Applied Sciences (2076-3417), 2019, v. 9, n. 24, p. 5520, doi. 10.3390/app9245520
- Lee, Seongil;
- Song, Kyohyun;
- Kim, Sangmin
- Article
33
- Journal of Applied Security Research, 2011, v. 6, n. 4, p. 449, doi. 10.1080/19361610.2011.604070
- Ciampa, Mark;
- Revels, Mark;
- Enamait, John
- Article
34
- Cardozo Arts & Entertainment Law Journal, 2013, v. 31, n. 3, p. 875
- Article
36
- MIS Quarterly, 2022, v. 46, n. 3, p. 1721, doi. 10.25300/MISQ/2022/15511
- Vance, Anthony;
- Eargle, David;
- Eggett, Dennis;
- Straub, Detmar W.;
- Ouimet, Kirk
- Article
37
- Journal of the Association for Information Systems, 2021, v. 22, n. 3, p. 739, doi. 10.17705/1jais.00678
- Han Li;
- Xin (Robert) Luo;
- Yan Chen
- Article
38
- Online Journal of Applied Knowledge Management, 2016, v. 4, n. 1, p. 99, doi. 10.36965/ojakm.2016.4(1)99-116
- Mujeye, Stephen;
- Levy, Yair;
- Mattord, Herbert;
- Wei Li
- Article
39
- Electronics (2079-9292), 2020, v. 9, n. 5, p. 733, doi. 10.3390/electronics9050733
- Kim, Mijin;
- Moon, Jongho;
- Won, Dongho;
- Park, Namje
- Article
40
- International Journal of Heat & Technology, 2021, v. 39, n. 5, p. 1491, doi. 10.18280/ijht.390511
- Yi Zhang;
- Qinjing Wu;
- Wei Hu
- Article
41
- Mobile Networks & Applications, 2019, v. 24, n. 4, p. 1152, doi. 10.1007/s11036-019-01252-4
- Lavanya, S.;
- SaravanaKumar, N. M.;
- Vijayakumar, V.;
- Thilagam, S.
- Article
42
- Pakistan Journal of Science, 2018, v. 70, n. 4, p. 304
- Wajid, A.;
- Ahmad, T.;
- Rafique, M.
- Article
43
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 5, p. 184, doi. 10.14569/ijacsa.2024.0150520
- Article
44
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2013, v. 38, n. 8, p. 2069, doi. 10.1007/s13369-013-0543-z
- Liu, Tingting;
- Pu, Qiong;
- Zhao, Yong;
- Wu, Shuhua
- Article
45
- Information Security Journal: A Global Perspective, 2022, v. 31, n. 2, p. 179, doi. 10.1080/19393555.2021.1893410
- Chuma, Kabelo Given;
- Ngoepe, Mpho
- Article
46
- Information Security Journal: A Global Perspective, 2018, v. 27, n. 1, p. 29, doi. 10.1080/19393555.2018.1423713
- Chen, Longbin;
- Chen, Li-Chiou;
- Nassar, Nader
- Article
47
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 94, doi. 10.1080/19393555.2016.1179374
- Alsaiari, Hussain;
- Papadaki, Maria;
- Dowland, Paul;
- Furnell, Steven
- Article
48
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 4, p. 180, doi. 10.1080/19393555.2013.830347
- Article
49
- Strategic Finance, 2008, v. 89, n. 11, p. 44
- Article
50
- Strategic Finance, 2008, v. 89, n. 11, p. 42
- Article