Works matching DE "PASSWORD software"
Results: 26
ВИКОРИСТАННЯ МЕНЕДЖЕРА ПАРОЛІВ KEEPASS ДЛЯ ЗАБЕЗПЕЧЕННЯ ЗАХИЩЕНОСТІ ДАНИХ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 2, p. 324, doi. 10.18372/2225-5036.30.19245
- By:
- Publication type:
- Article
How Verizon Media Built a Cybersecurity Culture.
- Published in:
- MIS Quarterly Executive, 2022, v. 21, n. 2, p. 165, doi. 10.17705/2msqe.00064
- By:
- Publication type:
- Article
Positively Fearful: Activating the Individual's HERO Within to Explain Volitional Security Technology Adoption.
- Published in:
- Journal of the Association for Information Systems, 2023, v. 24, n. 3, p. 664, doi. 10.17705/1jais.00793
- By:
- Publication type:
- Article
SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- By:
- Publication type:
- Article
Password Managers—It's All about Trust and Transparency.
- Published in:
- Future Internet, 2020, v. 12, n. 11, p. 189, doi. 10.3390/fi12110189
- By:
- Publication type:
- Article
РОЗРОБКА ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ ЗБЕРІГАННЯ ТА ЗАХИСТУ ДАНИХ ДЛЯ ПРИВАТНОГО ТА КОРПОРАТИВНОГО ЗАСТОСУВАННЯ
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 1/2, p. 15, doi. 10.15276/imms.v12.no1-2.15
- By:
- Publication type:
- Article
A comprehensive study of Mozi botnet.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 10, p. 6877, doi. 10.1002/int.22866
- By:
- Publication type:
- Article
Why Password Services: Are Still Relevant, Even Though They're Getting Hacked.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2022, v. 27, n. 4, p. 8
- By:
- Publication type:
- Article
Using Theme-based Narrative Construct of Images as Passwords: Implementation and Assessment of Remembered Sequen.
- Published in:
- International Journal of Online Engineering, 2017, v. 13, n. 11, p. 77, doi. 10.3991/ijoe.v13i11.7774
- By:
- Publication type:
- Article
GPU-Based High Performance Password Recovery Technique for Hash Functions.
- Published in:
- Journal of Information Science & Engineering, 2016, v. 32, n. 1, p. 97
- By:
- Publication type:
- Article
Shibboleth: Judges, Derrida, Celan by Marc Redfield (review).
- Published in:
- MLN, 2022, v. 137, n. 3, p. 616, doi. 10.1353/mln.2022.0045
- By:
- Publication type:
- Article
Bilinmeyen PLC Programının Makine Öğrenmesi Yöntemleriyle Taklit Edilmesi.
- Published in:
- International Journal of Engineering Research & Development (IJERAD), 2023, v. 15, n. 3, p. 257, doi. 10.29137/umagd.1364512
- By:
- Publication type:
- Article
D- Protect: A Decentralized Personal Information Vault.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3073
- By:
- Publication type:
- Article
Protect Your Dental Practice.
- Published in:
- Ontario Dentist, 2023, v. 100, n. 10, p. 26
- By:
- Publication type:
- Article
DOWNLOAD ME.
- Published in:
- 2017
- Publication type:
- Product Review
Cybersecurity vulnerabilities and solutions in Ethiopian university websites.
- Published in:
- Journal of Big Data, 2024, v. 11, n. 1, p. 1, doi. 10.1186/s40537-024-00980-z
- By:
- Publication type:
- Article
An overview of protection of privacy in multibiometrics.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 6, p. 6753, doi. 10.1007/s11042-017-4596-y
- By:
- Publication type:
- Article
Security Systems Based On Eye Movement Tracking Methods.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2018, v. 10, n. 3, p. 70, doi. 10.29304/jqcm.2018.10.3.439
- By:
- Publication type:
- Article
Smart touchless human–machine interaction based on crystalline porous cages.
- Published in:
- Nature Communications, 2024, v. 15, n. 1, p. 1, doi. 10.1038/s41467-024-46071-8
- By:
- Publication type:
- Article
CM-Droid: Secure Container for Android Password Misuse Vulnerability.
- Published in:
- Computers, Materials & Continua, 2019, v. 59, n. 1, p. 181, doi. 10.32604/cmc.2019.05813
- By:
- Publication type:
- Article
New tools.
- Published in:
- 2014
- Publication type:
- Product Review
Balancing Password Security and User Convenience: Exploring the Potential of Prompt Models for Password Generation.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 10, p. 2159, doi. 10.3390/electronics12102159
- By:
- Publication type:
- Article
TOOLS OF THE TRADE.
- Published in:
- 2017
- Publication type:
- Product Review
Password Aggravation.
- Published in:
- 2012
- By:
- Publication type:
- Product Review
A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 3, p. 678, doi. 10.3390/s19030678
- By:
- Publication type:
- Article
Energy-efficient distributed password hash computation on heterogeneous embedded system.
- Published in:
- Automatika: Journal for Control, Measurement, Electronics, Computing & Communications, 2022, v. 63, n. 3, p. 399, doi. 10.1080/00051144.2022.2042115
- By:
- Publication type:
- Article