Works matching Computer passwords
1
- International Journal of Mathematical Education in Science & Technology, 2015, v. 46, n. 3, p. 441, doi. 10.1080/0020739X.2014.982730
- Article
2
- Computers in the Schools, 2013, v. 30, n. 3, p. 282, doi. 10.1080/07380569.2013.807719
- Article
3
- Arizona State Law Journal, 2012, v. 44, n. 3, p. 1293
- Article
4
- Telkomnika, 2019, v. 17, n. 2, p. 745, doi. 10.12928/TELKOMNIKA.v17i2.11775
- Harianto, Hansen Edrick;
- Gunawan, Dennis
- Article
5
- South African Journal of Information Management, 2015, v. 17, n. 1, p. 1, doi. 10.4102/sajim.v17i1.638
- Butler, Rika;
- Butler, Martin
- Article
6
- SAM Advanced Management Journal (00360805), 1971, v. 36, n. 3, p. 8
- Article
7
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 3, p. 243, doi. 10.15276/imms.v12.no3.243
- Шеремет, Г. О.;
- Стопакевич, О. А.
- Article
8
- ComputerWorld Hong Kong, 2014, p. 44
- Article
9
- Australasian Journal of Information Systems, 2021, v. 25, p. 1, doi. 10.3127/ajis.v25i0.2953
- Mwagwabi, Florence;
- Jhee Hee Jiow
- Article
10
- Journal of Financial Planning, 2005, v. 18, p. 12
- Article
11
- Journal of Information System Security, 2018, v. 14, n. 1, p. 31
- Kävrestad, Joakim;
- Eriksson, Fredrik;
- Nohlberg, Marcus
- Article
12
- Journal of Health Care Compliance, 2004, v. 6, n. 6, p. 52
- Bresz, Frank P.;
- Villacres, Caline A.
- Article
13
- Strategic Finance, 2003, v. 85, n. 3, p. 59
- Article
14
- 2016
- Lynskey, Jeff;
- River, Powell
- Letter to the Editor
15
- Journal of Computing & Information Technology, 2012, v. 20, n. 2, p. 85, doi. 10.2498/cit.1001983
- Onashoga, Adebukola;
- Sodiya, Adesina;
- Afolorunso, A.
- Article
16
- Frontiers in Health Informatics, 2024, v. 13, n. 8, p. 947
- Gena, Hemant;
- Gupta, Binny
- Article
17
- Türkiye Adalet Akademisi Dergisi, 2020, v. 11, n. 43, p. 219
- KARAKURT EREN, Öğretim Üyesi Ahu
- Article
18
- Journal of the Institute of Engineering, 2019, v. 15, n. 2, p. 218
- Giri, Shailendra;
- Shakya, Subarna
- Article
19
- Journal of Internet Commerce, 2010, v. 9, n. 1, p. 23, doi. 10.1080/15332861.2010.487415
- McCrohan, KevinF.;
- Engel, Kathryn;
- Harvey, JamesW.
- Article
20
- IEEE Internet Computing, 2008, v. 12, n. 5, p. 84, doi. 10.1109/MIC.2008.108
- Article
21
- Journal of the Missouri Bar, 2017, v. 73, n. 1, p. 32
- Article
22
- South African Journal of Information Management, 2018, v. 20, n. 1, p. 1, doi. 10.4102/sajim.v20i1.920
- Butler, Rika;
- Butler, Martin
- Article
23
- Cryptography (2410-387X), 2023, v. 7, n. 1, p. 9, doi. 10.3390/cryptography7010009
- Haddad, Joseph;
- Pitropakis, Nikolaos;
- Chrysoulas, Christos;
- Lemoudden, Mouad;
- Buchanan, William J.
- Article
24
- ISSA Journal, 2019, v. 17, n. 5, p. 12
- Article
25
- CPA Journal, 2008, v. 78, n. 5, p. 70
- Article
26
- CPA Journal, 2004, v. 74, n. 7, p. 6
- Article
27
- Temple Law Review, 2013, v. 85, n. 3, p. 655
- Article
28
- International Journal of Online Engineering, 2017, v. 13, n. 11, p. 77, doi. 10.3991/ijoe.v13i11.7774
- Chellaiah, Priya;
- Nair, Bipin;
- Achuthan, Krishnashree;
- Diwakar, Shyam
- Article
29
- Strategic Finance, 2008, v. 89, n. 11, p. 44
- Article
30
- Strategic Finance, 2008, v. 89, n. 11, p. 42
- Article
31
- Yale Law & Policy Review, 2013, v. 32, n. 1, p. 239
- Stockton, Patti N.;
- Golabek-Goldman, Michele
- Article
32
- Pharma + Food, 2024, p. 82
- Article
33
- International Journal of Pattern Recognition & Artificial Intelligence, 2009, v. 23, n. 5, p. 987, doi. 10.1142/S0218001409007429
- OSTOJIC, P.;
- PHILLIPS, J. G.
- Article
34
- Punjab University Journal of Mathematics, 2024, v. 56, n. 6, p. 230, doi. 10.52280/pujm.2024.56(6)01
- Aftab, Muhammad Haroon;
- Rehman, Shakeela
- Article
35
- Rutgers Computer & Technology Law Journal, 2021, v. 48, n. 1, p. 117
- Article
36
- Rutgers Computer & Technology Law Journal, 2013, v. 39, n. 2, p. 194
- Article
37
- Adhoc & Sensor Wireless Networks, 2023, v. 56, n. 3/4, p. 163, doi. 10.32908/ahswn.v56.9841
- SINGH, ROHIT;
- AWASTHI, LALIT KUMAR;
- SHARMA, K. P.
- Article
38
- Financial Executive, 1992, v. 8, n. 4, p. 34
- Article
39
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/1694702
- Yang, Chao;
- Zhang, Junwei;
- Guo, Jingjing;
- Zheng, Yu;
- Yang, Li;
- Ma, Jianfeng
- Article
40
- Optometry Times, 2012, v. 4, n. 7, p. 20
- Article
41
- Utah Bar Journal, 2019, v. 32, n. 3, p. 54
- Article
42
- Journal of Crime & Justice, 2009, v. 32, n. 1, p. 1, doi. 10.1080/0735648X.2009.9721260
- Morris, Robert G.;
- Blackburn, Ashley G.
- Article
43
- Engineering Letters, 2020, v. 28, n. 2, p. 300
- Article
44
- Engineering Letters, 2020, v. 28, n. 2, p. 268
- Tbatou, Zakariae;
- Asimi, Ahmed;
- Balmany, Chawki El;
- Asimi, Younes;
- G., Azidine
- Article
45
- International Journal of Emerging Trends in Science & Technology, 2019, v. 5, n. 2, p. 1
- Ramya, S.;
- Kayathri, S.;
- Meena, S.
- Article
46
- Journal of the Korea Institute of Information & Communication Engineering, 2019, v. 23, n. 9, p. 1173, doi. 10.6109/jkiice.2019.23.9.1173
- Article
47
- International Journal of Heat & Technology, 2021, v. 39, n. 5, p. 1491, doi. 10.18280/ijht.390511
- Yi Zhang;
- Qinjing Wu;
- Wei Hu
- Article
48
- International Journal of Advanced Research in Computer Science, 2020, v. 11, n. 3, p. 50, doi. 10.26483/ijarcs.v11i3.6599
- Muhibur Rahman, T. R.;
- Neha K.;
- Priyanka G.;
- Reshma M.;
- Pavitra V.
- Article
49
- MIS Quarterly, 2022, v. 46, n. 3, p. 1721, doi. 10.25300/MISQ/2022/15511
- Vance, Anthony;
- Eargle, David;
- Eggett, Dennis;
- Straub, Detmar W.;
- Ouimet, Kirk
- Article
50
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5563884
- Shi, Ruixin;
- Zhou, Yongbin;
- Li, Yong;
- Han, Weili
- Article