Works matching DE "COMPUTER password security"
1
- South African Journal of Information Management, 2018, v. 20, n. 1, p. 1, doi. 10.4102/sajim.v20i1.920
- Butler, Rika;
- Butler, Martin
- Article
2
- South African Journal of Information Management, 2015, v. 17, n. 1, p. 1, doi. 10.4102/sajim.v17i1.638
- Butler, Rika;
- Butler, Martin
- Article
3
- Frontiers in Health Informatics, 2024, v. 13, n. 8, p. 947
- Gena, Hemant;
- Gupta, Binny
- Article
4
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 342
- R., Palani Kumar;
- S., Bharathi;
- K., Sowmiya
- Article
5
- ISSA Journal, 2020, v. 18, n. 6, p. 7
- Article
6
- ISSA Journal, 2019, v. 17, n. 5, p. 12
- Article
7
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- Dmitrienko, Alexandra;
- Liebchen, Christopher;
- Rossow, Christian;
- Sadeghi, Ahmad-Reza
- Article
8
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 1, p. 59, doi. 10.18372/2225-5036.25.13668
- Бурячок, Володимир;
- Платоненко, Артем;
- Семко, Олексій
- Article
9
- BVICAM's International Journal of Information Technology, 2016, v. 8, n. 1, p. 959
- Sriharsha, B. S.;
- Zabiullah;
- Vishnu, S. B.;
- Sanju, V.
- Article
10
- Educational Technology Research & Development, 2019, v. 67, n. 4, p. 931, doi. 10.1007/s11423-019-09665-4
- Sher, Keren Ben-Tov;
- Levi-Keren, Michal;
- Gordon, Goren
- Article
11
- International Journal of Electrical & Computer Engineering (2088-8708), 2020, v. 10, n. 2, p. 1552, doi. 10.11591/ijece.v10i2.pp1552-1560
- B. K., Chethan;
- Siddappa, M.;
- H. S., Jayanna
- Article
12
- International Journal of Electrical & Computer Engineering (2088-8708), 2019, v. 9, n. 3, p. 1879, doi. 10.11591/ijece.v9i3.pp1879-1886
- Omolara, Abiodun Esther;
- Jantan, Aman;
- Abiodun, Oludare Isaac;
- Arshad, Humaira;
- Mohamed, Nachaat AbdElatif
- Article
13
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/2509267
- Liu, Jing;
- Liu, Rongchao;
- Lai, Yingxu
- Article
14
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5563884
- Shi, Ruixin;
- Zhou, Yongbin;
- Li, Yong;
- Han, Weili
- Article
15
- Telkomnika, 2019, v. 17, n. 2, p. 745, doi. 10.12928/TELKOMNIKA.v17i2.11775
- Harianto, Hansen Edrick;
- Gunawan, Dennis
- Article
16
- Telkomnika, 2019, v. 17, n. 2, p. 826, doi. 10.12928/TELKOMNIKA.v17i2.11754
- Kusnardi, Kevin;
- Gunawan, Dennis
- Article
17
- Telkomnika, 2018, v. 16, n. 6, p. 2643, doi. 10.12928/TELKOMNIKA.v16i6.10437
- Aramice, Gregor Alexander;
- Jaafar Qassim Kadhim
- Article
18
- Telkomnika, 2018, v. 16, n. 2, p. 755, doi. 10.12928/TELKOMNIKA.v16i2.7572
- Martin, Magdin;
- Štefan, Koprda;
- Ľubor, Ferenczy
- Article
19
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/6236494
- Echevarria, Juan Jose;
- Legarda, Jon;
- Larrañaga, Janire;
- Ruiz-de-Garibay, Jonathan
- Article
20
- Strategic Finance, 2008, v. 89, n. 11, p. 44
- Article
21
- Strategic Finance, 2008, v. 89, n. 11, p. 42
- Article
22
- IAENG International Journal of Computer Science, 2021, v. 48, n. 1, p. 152
- Somboonpattanakit, Chaovalit;
- Wisitpongphan, Nawaporn
- Article
23
- IAENG International Journal of Computer Science, 2020, v. 47, n. 1, p. 95
- Ogbuokiri, Blessing;
- Raborife, Mpho
- Article
24
- Multimedia Tools & Applications, 2020, v. 79, n. 23/24, p. 17081, doi. 10.1007/s11042-019-7615-3
- Ramasamy, Priya;
- Ranganathan, Vidhyapriya;
- Palanisamy, Venketesh;
- Kadry, Seifedine
- Article
25
- Pakistan Journal of Science, 2018, v. 70, n. 4, p. 304
- Wajid, A.;
- Ahmad, T.;
- Rafique, M.
- Article
26
- Peer-to-Peer Networking & Applications, 2020, v. 13, n. 2, p. 475, doi. 10.1007/s12083-019-00727-1
- Son, Dongsik;
- Huh, Seungpyo;
- Lee, Taejin;
- Kwak, Jin
- Article
27
- Sensors (14248220), 2020, v. 20, n. 11, p. 3015, doi. 10.3390/s20113015
- Panda, Sourav;
- Liu, Yuanzhen;
- Hancke, Gerhard Petrus;
- Qureshi, Umair Mujtaba
- Article
29
- Mining Engineering, 2019, p. 13
- Article
30
- Iraqi Journal of Information Technology, 2019, v. 9, n. 3, Part 1, p. 39
- Ibrahim, Abdulrahman Salam;
- Hussein, Karim Q.
- Article
31
- Computer Law Review International, 2020, v. 21, n. 3, p. 89, doi. 10.9785/cri-2020-210307
- Article
32
- Computer Journal, 2017, v. 60, n. 12, p. 1912, doi. 10.1093/comjnl/bxx078
- FIORE, DARIO;
- GONZÁLEZ VASCO, MARÍA ISABEL;
- SORIENTE, CLAUDIO
- Article
33
- China Business Review, 2014, p. 1
- Article
34
- EAI Endorsed Transactions on Security & Safety, 2018, v. 5, n. 17, p. 1, doi. 10.4108/eai.10-1-2019.156244
- Yue Li;
- Haining Wang;
- Kun Sun
- Article
35
- Information (2078-2489), 2016, v. 7, n. 2, p. 34, doi. 10.3390/info7020034
- Yoshizawa, Masatoshi;
- Hironori, Washizaki;
- Fukazawa, Yoshiaki;
- Okubo, Takao;
- Kaiya, Haruhiko;
- Yoshioka, Nobukazu
- Article
36
- Symmetry (20738994), 2016, v. 8, n. 11, p. 131, doi. 10.3390/sym8110131
- Jie Zhang;
- Xin Huang;
- Craig, Paul;
- Marshall, Alan;
- Dawei Liu
- Article
37
- International Journal of Human-Computer Interaction, 2019, v. 35, n. 19, p. 1800, doi. 10.1080/10447318.2019.1574057
- Katsini, Christina;
- Fidas, Christos;
- Belk, Marios;
- Samaras, George;
- Avouris, Nikolaos
- Article
38
- International Journal of Simulation: Systems, Science & Technology, 2018, v. 19, n. 6, p. 1, doi. 10.5013/IJSSST.a.19.06.33
- Lalitha, D.;
- Vaithyasubramanian, S.;
- Vengatakrishnan, K.;
- Christy, A.;
- Metilda, M. I. Mary
- Article
39
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 491
- Article
40
- 2016
- Lynskey, Jeff;
- River, Powell
- Letter to the Editor
41
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/5935292
- Article
42
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6563089
- Article
43
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1210, doi. 10.1002/sec.834
- Irshad, Azeem;
- Sher, Muhammad;
- Faisal, Muhammad Shahzad;
- Ghani, Anwer;
- Ul Hassan, Mahmood;
- Ashraf Ch, Shehzad
- Article
44
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2013, v. 38, n. 8, p. 2069, doi. 10.1007/s13369-013-0543-z
- Liu, Tingting;
- Pu, Qiong;
- Zhao, Yong;
- Wu, Shuhua
- Article
45
- Engineering Letters, 2020, v. 28, n. 2, p. 300
- Article
46
- Engineering Letters, 2020, v. 28, n. 2, p. 268
- Tbatou, Zakariae;
- Asimi, Ahmed;
- Balmany, Chawki El;
- Asimi, Younes;
- G., Azidine
- Article
47
- Contract Management, 2015, v. 55, n. 8, p. 58
- Article
48
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 8, p. 5657, doi. 10.1007/s00500-019-04138-5
- He, Junhui;
- Han, Dezhi;
- Li, Kuan-Ching
- Article
49
- i-Manager's Journal on Computer Science, 2018, v. 6, n. 3, p. 16, doi. 10.26634/jcom.6.3.15697
- ADAMA, VICTOR N.;
- DOGONYARO, NOEL MOSES;
- YISA, VICTOR L.;
- MESHACH, BABA;
- AYOBAMI, EKUNDAYO
- Article
50
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 10, p. N.PAG, doi. 10.1002/ett.3745
- Kaur, Damandeep;
- Kumar, Devender;
- Saini, Khushil Kumar;
- Grover, Harmanpreet Singh
- Article