Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 38.155
1.
  • Encouraging users to improv... Encouraging users to improve password security and memorability
    Yıldırım, M.; Mackie, I. International journal of information security, 12/2019, Letnik: 18, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Security issues in text-based password authentication are rarely caused by technical issues, but rather by the limitations of human memory, and human perceptions together with their consequential ...
Celotno besedilo
Dostopno za: CEKLJ, DOBA, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, IZUM, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UILJ, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
2.
  • Secure Password-Protected E... Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems
    Zhang, Yuan; Xu, Chunxiang; Cheng, Nan ... IEEE transactions on dependable and secure computing, 07/2022, Letnik: 19, Številka: 4
    Journal Article

    In this paper, we propose SPADE, an encrypted data deduplication scheme that resists compromised key servers and frees users from the key management problem. Specifically, we propose a ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
3.
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • Beyond Credential Stuffing: Password Similarity Models Using Neural Networks
    Pal, Bijeeta; Daniel, Tal; Chatterjee, Rahul ... 2019 IEEE Symposium on Security and Privacy (SP)
    Conference Proceeding
    Odprti dostop

    Attackers increasingly use passwords leaked from one website to compromise associated accounts on other websites. Such targeted attacks work because users reuse, or pick similar, passwords for ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
5.
  • Improving password memorabi... Improving password memorability, while not inconveniencing the user
    Woods, Naomi; Siponen, Mikko International journal of human-computer studies, August 2019, 2019-08-00, Letnik: 128
    Journal Article
    Recenzirano
    Odprti dostop

    •Increasing the number of password verification times by twice or three times, can significantly increase password memorability.•Increasing the number of password verification times by twice or three ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
6.
  • TransPCFG: Transferring the... TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively
    Han, Weili; Xu, Ming; Zhang, Junjie ... IEEE transactions on information forensics and security, 2021, Letnik: 16
    Journal Article
    Recenzirano

    Long passwords are gaining popularity in password policy recommendations; however, data-driven guessing studies are woefully inadequate in adapting to long passwords, lacking in both guessing ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
7.
  • Zipf's Law in Passwords Zipf's Law in Passwords
    Wang, Ding; Cheng, Haibo; Wang, Ping ... IEEE transactions on information forensics and security, 2017-Nov., 2017-11-00, Letnik: 12, Številka: 11
    Journal Article
    Recenzirano

    Despite three decades of intensive research efforts, it remains an open question as to what is the underlying distribution of user-generated passwords. In this paper, we make a substantial step ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
8.
  • A Novel Password Policy Foc... A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data
    Güven, Ebu Yusuf; Boyaci, Ali; Aydin, Muhammed Ali Computers & security, February 2022, 2022-02-00, 20220201, Letnik: 113
    Journal Article
    Recenzirano

    Online services generally employ password-based systems to enable users to access personal/private content. These services also force their users to change their passwords periodically under specific ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
9.
  • BDPM: A secure batch dynami... BDPM: A secure batch dynamic password management scheme in industrial internet environments
    Feng, Jingyu; Yan, Rui; Han, Gang ... Future generation computer systems, August 2024, 2024-08-00, Letnik: 157
    Journal Article
    Recenzirano

    •Construct a batch dynamic password management system architecture.•Design a batch password generation algorithm using SM3 cryptographic hash algorithm.•Introduce an abnormal password update ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
10.
  • AvoidPwd: A mnemonic passwo... AvoidPwd: A mnemonic password generation strategy based on keyboard transformation
    Lyu, Shunying; Yao, Qian; Song, Jianhua China communications, 10/2022, Letnik: 19, Številka: 10
    Journal Article
    Recenzirano

    Identity authentication is the first line of defense for network security. Passwords have been the most widely used authentication method in recent years. Although there are security risks in ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
1 2 3 4 5
zadetkov: 38.155

Nalaganje filtrov