DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 134
1.
  • Improving password memorabi... Improving password memorability, while not inconveniencing the user
    Woods, Naomi; Siponen, Mikko International journal of human-computer studies, August 2019, 2019-08-00, Letnik: 128
    Journal Article
    Recenzirano
    Odprti dostop

    •Increasing the number of password verification times by twice or three times, can significantly increase password memorability.•Increasing the number of password verification times by twice or three ...
Celotno besedilo
Dostopno za: UL

PDF
2.
  • Improving Password Guessing via Representation Learning
    Pasquini, Dario; Gangwal, Ankit; Ateniese, Giuseppe ... 2021 IEEE Symposium on Security and Privacy (SP)
    Conference Proceeding
    Odprti dostop

    Learning useful representations from unstructured data is one of the core challenges, as well as a driving force, of modern data-driven approaches. Deep learning has demonstrated the broad advantages ...
Celotno besedilo
Dostopno za: UL

PDF
3.
  • PassPoints: Design and long... PassPoints: Design and longitudinal evaluation of a graphical password system
    Wiedenbeck, Susan; Waters, Jim; Birget, Jean-Camille ... International journal of human-computer studies, 07/2005, Letnik: 63, Številka: 1
    Journal Article
    Recenzirano

    Computer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords over time if they choose a secure password, i.e. a password that is ...
Celotno besedilo
Dostopno za: UL
4.
  • Honeywords Generation Techn... Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
    A.Ahmed, Maher Wasit Journal for Pure Sciences, 12/2023, Letnik: 2, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with ...
Celotno besedilo
Dostopno za: UL
5.
  • Fixed-text keystroke dynami... Fixed-text keystroke dynamics authentication data set—collection and analysis
    Risto, Halvor Nybø; Graven, Olaf Hallan Annales des télécommunications, 05/2024
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract Keystroke dynamics authentication is a method of authenticating a user and could be an alternative or addition to one-time codes, with minimal user inconvenience. In this study, a new data ...
Celotno besedilo
Dostopno za: UL
6.
  • BDPM: A secure batch dynami... BDPM: A secure batch dynamic password management scheme in industrial internet environments
    Feng, Jingyu; Yan, Rui; Han, Gang ... Future generation computer systems, August 2024, 2024-08-00, Letnik: 157
    Journal Article
    Recenzirano

    •Construct a batch dynamic password management system architecture.•Design a batch password generation algorithm using SM3 cryptographic hash algorithm.•Introduce an abnormal password update ...
Celotno besedilo
Dostopno za: UL
7.
Celotno besedilo
Dostopno za: UL
8.
Celotno besedilo
Dostopno za: UL

PDF
9.
  • Measuring password guessabi... Measuring password guessability for an entire university
    Mazurek, Michelle L.; Komanduri, Saranga; Vidas, Timothy ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 11/2013
    Conference Proceeding
    Odprti dostop

    Despite considerable research on passwords, empirical studies of password strength have been limited by lack of access to plaintext passwords, small data sets, and password sets specifically ...
Celotno besedilo
Dostopno za: UL

PDF
10.
  • Information Security Practi... Information Security Practices and Intervention Among Teenagers
    Radhakrishnan, Satish; Rajendran, Lavanya The Journal of computer information systems, 07/2024, Letnik: 64, Številka: 4
    Journal Article
    Recenzirano

    In the digital age, information is drastically exchanged among users. This data exchange paved the way for unsolicited access by cybercriminals, which could lead to psychological and financial loss. ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 134

Nalaganje filtrov