Works matching Computer passwords
Results: 1079
A pedagogical example of second-order arithmetic sequences applied to the construction of computer passwords by upper elementary grade students.
- Published in:
- International Journal of Mathematical Education in Science & Technology, 2015, v. 46, n. 3, p. 441, doi. 10.1080/0020739X.2014.982730
- By:
- Publication type:
- Article
Implications of What Children Know About Computer Passwords.
- Published in:
- Computers in the Schools, 2013, v. 30, n. 3, p. 282, doi. 10.1080/07380569.2013.807719
- By:
- Publication type:
- Article
UNBREAKABLE: The Fifth Amendment and Computer Passwords.
- Published in:
- Arizona State Law Journal, 2012, v. 44, n. 3, p. 1293
- By:
- Publication type:
- Article
Wi-Fi password stealing program using USB rubber ducky.
- Published in:
- Telkomnika, 2019, v. 17, n. 2, p. 745, doi. 10.12928/TELKOMNIKA.v17i2.11775
- By:
- Publication type:
- Article
The password practices applied by South African online consumers: Perception versus reality.
- Published in:
- South African Journal of Information Management, 2015, v. 17, n. 1, p. 1, doi. 10.4102/sajim.v17i1.638
- By:
- Publication type:
- Article
The Future Is Passwordless: Why the Digital Age Is Killing the Password.
- Published in:
- ISSA Journal, 2019, v. 17, n. 5, p. 12
- By:
- Publication type:
- Article
PASSWORD UNPROTECTED: COMPELLED DISCLOSURE OF CELLPHONE PASSWORDS AND THE FOREGONE CONCLUSION EXCEPTION.
- Published in:
- Rutgers Computer & Technology Law Journal, 2021, v. 48, n. 1, p. 117
- By:
- Publication type:
- Article
PASSWORD PROTECTION AND SELF-INCRIMINATION: APPLYING THE FIFTH AMENDMENT PRIVILEGE IN THE TECHNOLOGICAL ERA.
- Published in:
- Rutgers Computer & Technology Law Journal, 2013, v. 39, n. 2, p. 194
- By:
- Publication type:
- Article
COMPUTERS AND PRIVACY.
- Published in:
- SAM Advanced Management Journal (00360805), 1971, v. 36, n. 3, p. 8
- By:
- Publication type:
- Article
A One-Time Server-Specific Password Authentication Scheme.
- Published in:
- Journal of Computing & Information Technology, 2012, v. 20, n. 2, p. 85, doi. 10.2498/cit.1001983
- By:
- Publication type:
- Article
A PASSWORD TO COMPUTER SECURITY.
- Published in:
- Financial Executive, 1992, v. 8, n. 4, p. 34
- By:
- Publication type:
- Article
ОРГАНІЗАЦІЯ ДИСТАНЦІЙНОГО ДОСТУПУ ДО КОМП'ЮТЕРНОЇ НАВЧАЛЬНОЇ ЛАБОРАТОРІЇ ЗА ДОПОМОГОЮ ВЕБ-ТЕХНОЛОГІЙ.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 3, p. 243, doi. 10.15276/imms.v12.no3.243
- By:
- Publication type:
- Article
An Evaluation of Passwords.
- Published in:
- CPA Journal, 2008, v. 78, n. 5, p. 70
- By:
- Publication type:
- Article
Network Security and Password Policies.
- Published in:
- CPA Journal, 2004, v. 74, n. 7, p. 6
- By:
- Publication type:
- Article
THE DEVELOPMENT OF A PASSWORD CLASSIFICATION MODEL.
- Published in:
- Journal of Information System Security, 2018, v. 14, n. 1, p. 31
- By:
- Publication type:
- Article
Protect computers, network from identify theft with common sense, security tools.
- Published in:
- Optometry Times, 2012, v. 4, n. 7, p. 20
- By:
- Publication type:
- Article
MEMORABILITY OF ALTERNATIVE PASSWORD SYSTEMS.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2009, v. 23, n. 5, p. 987, doi. 10.1142/S0218001409007429
- By:
- Publication type:
- Article
Using Theme-based Narrative Construct of Images as Passwords: Implementation and Assessment of Remembered Sequen.
- Published in:
- International Journal of Online Engineering, 2017, v. 13, n. 11, p. 77, doi. 10.3991/ijoe.v13i11.7774
- By:
- Publication type:
- Article
Curbing the Market for Cyber Weapons.
- Published in:
- Yale Law & Policy Review, 2013, v. 32, n. 1, p. 239
- By:
- Publication type:
- Article
UPGRADING THE FIFTH AMENDMENT: NEW STANDARDS FOR PROTECTING ENCRYPTION PASSWORDS.
- Published in:
- Temple Law Review, 2013, v. 85, n. 3, p. 655
- By:
- Publication type:
- Article
Some password users are more equal than others: Towards customisation of online security initiatives.
- Published in:
- South African Journal of Information Management, 2018, v. 20, n. 1, p. 1, doi. 10.4102/sajim.v20i1.920
- By:
- Publication type:
- Article
Applications of Fourier Transformation with the help of Cryptography.
- Published in:
- Punjab University Journal of Mathematics, 2024, v. 56, n. 6, p. 230, doi. 10.52280/pujm.2024.56(6)01
- By:
- Publication type:
- Article
E-government Use in Nepal: Issues of Database Management and Data Security.
- Published in:
- Journal of the Institute of Engineering, 2019, v. 15, n. 2, p. 218
- By:
- Publication type:
- Article
Influence of Awareness and Training on Cyber Security.
- Published in:
- Journal of Internet Commerce, 2010, v. 9, n. 1, p. 23, doi. 10.1080/15332861.2010.487415
- By:
- Publication type:
- Article
Password Insecurity - Lessons from a Personal Story.
- Published in:
- Utah Bar Journal, 2019, v. 32, n. 3, p. 54
- By:
- Publication type:
- Article
Password policy Purgatory.
- Published in:
- IEEE Internet Computing, 2008, v. 12, n. 5, p. 84, doi. 10.1109/MIC.2008.108
- By:
- Publication type:
- Article
Compliance with security guidelines in teenagers: the conflicting role of peer influence and personal norms.
- Published in:
- Australasian Journal of Information Systems, 2021, v. 25, p. 1, doi. 10.3127/ajis.v25i0.2953
- By:
- Publication type:
- Article
BİLİŞİM ALANINDA SUÇLARIN VEYA BİLİŞİM SİSTEMLERİNİN ARAÇ OLARAK KULLANILDIĞI DİĞER SUÇLARIN İŞLENMESİ AMACIYLA CİHAZ, PROGRAM, ŞİFRE YA DA GÜVENLİK KODLARININ ÜRETİLMESİ, YAYILMASI VEYA BULUNDURULMASI SUÇU.
- Published in:
- Türkiye Adalet Akademisi Dergisi, 2020, v. 11, n. 43, p. 219
- By:
- Publication type:
- Article
Sorry, we don't recognize that user ID. Please try again.
- Published in:
- 2016
- By:
- Publication type:
- Letter to the Editor
Wie Biochemie beim Passwortschutz hilft.
- Published in:
- Pharma + Food, 2024, p. 82
- Publication type:
- Article
Fingerprint Protected Password Authentication Protocol.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/1694702
- By:
- Publication type:
- Article
Controlling Authentication in a Health Care Environment.
- Published in:
- Journal of Health Care Compliance, 2004, v. 6, n. 6, p. 52
- By:
- Publication type:
- Article
Steganography: Hiding Your Passwords in Plain Sight.
- Published in:
- Strategic Finance, 2008, v. 89, n. 11, p. 44
- Publication type:
- Article
How Strong Are Your Passwords?
- Published in:
- Strategic Finance, 2008, v. 89, n. 11, p. 42
- By:
- Publication type:
- Article
Infinite Patience.
- Published in:
- Strategic Finance, 2003, v. 85, n. 3, p. 59
- By:
- Publication type:
- Article
Security mistakes that will get you fired.
- Published in:
- ComputerWorld Hong Kong, 2014, p. 44
- Publication type:
- Article
For your eyes only.
- Published in:
- Journal of Financial Planning, 2005, v. 18, p. 12
- Publication type:
- Article
Attacking Windows Hello for Business: Is It What We Were Promised?
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 9, doi. 10.3390/cryptography7010009
- By:
- Publication type:
- Article
NEW YEAR'S RESOLUTION: IMPROVE YOUR PASSWORDS.
- Published in:
- Journal of the Missouri Bar, 2017, v. 73, n. 1, p. 32
- By:
- Publication type:
- Article
EEDF: Enhanced Encryption Decryption Framework for Device Authentication in IoT.
- Published in:
- Adhoc & Sensor Wireless Networks, 2023, v. 56, n. 3/4, p. 163, doi. 10.32908/ahswn.v56.9841
- By:
- Publication type:
- Article
Client Authentication By Selected Secure Password-Based On Image Using Challenge Handshake Authentication Protocol.
- Published in:
- Iraqi Journal of Information Technology, 2019, v. 9, n. 3, Part 1, p. 39
- By:
- Publication type:
- Article
Understanding Information Security Policy Violation from a Situational Action Perspective.
- Published in:
- Journal of the Association for Information Systems, 2021, v. 22, n. 3, p. 739, doi. 10.17705/1jais.00678
- By:
- Publication type:
- Article
Mindlessly Following "Best Practices".
- Published in:
- ISSA Journal, 2020, v. 18, n. 6, p. 7
- By:
- Publication type:
- Article
Visual Password Scheme Using Bag Context Shape Grammars.
- Published in:
- Journal of Information Assurance & Security, 2020, v. 15, n. 2, p. 65
- By:
- Publication type:
- Article
An Evaluation Model for Recognition-based Graphical Password Schemes.
- Published in:
- Journal of Information Assurance & Security, 2019, v. 14, n. 3, p. 067
- By:
- Publication type:
- Article
A Human-Cognitive Perspective of Users' Password Choices in Recognition-Based Graphical Authentication.
- Published in:
- International Journal of Human-Computer Interaction, 2019, v. 35, n. 19, p. 1800, doi. 10.1080/10447318.2019.1574057
- By:
- Publication type:
- Article
Password Protected Locking System Using Arduino.
- Published in:
- BVICAM's International Journal of Information Technology, 2016, v. 8, n. 1, p. 959
- By:
- Publication type:
- Article
Secured Key Management Scheme for Multicast Network Using Graphical Password.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 4, p. 1152, doi. 10.1007/s11036-019-01252-4
- By:
- Publication type:
- Article
A FACE RECOGNITION AND GRAPHICAL PASSWORD BASED HYBRID TECHNIQUE OF INFORMATION SECURITY.
- Published in:
- Pakistan Journal of Science, 2018, v. 70, n. 4, p. 304
- By:
- Publication type:
- Article
APPLYING EMPIRICAL THRESHOLDING ALGORITHM FOR A KEYSTROKE DYNAMICS BASED AUTHENTICATION SYSTEM.
- Published in:
- Journal of Information & Communication Technology, 2019, v. 18, n. 4, p. 383, doi. 10.32890/jict2018.18.4.1
- By:
- Publication type:
- Article