|
|
|
Sakorn Mekruksavanich and Anuchit Jitpattanakul
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individ...
ver más
|
|
|
|
|
|
|
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex...
ver más
|
|
|
|
|
|
|
Jackson Horlick Teng, Thian Song Ong, Tee Connie, Kalaiarasi Sonai Muthu Anbananthen and Pa Pa Min
The finger vein recognition system uses blood vessels inside the finger of an individual for identity verification. The public is in favor of a finger vein recognition system over conventional passwords or ID cards as the biometric technology is harder t...
ver más
|
|
|
|
|
|
|
Tsung-Hung Lin and Ming-Te Chen
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tampere...
ver más
|
|
|
|
|
|
|
Fatima Salahdine and Naima Kaabouch
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the securit...
ver más
|
|
|
|
|
|
|
Ruti Gafni, Tal Pavel, Raz Margolin, Ben Weiss
Pág. 27 - 41
Passwords are the standard means of registration and access to Websites, information systems, online services and various social networks. Databases are increasingly breached and social engineering is employed to obtain usernames and passwords for online...
ver más
|
|
|
|
|
|
|
Cynthia L. Knott, G. Steube
Increasing concerns about security and privacy have raised the bar for interest in ways to protect information. Although newer approaches include face recognition, the use of passwords is commonly used today as the best approach for protecting data. Web ...
ver más
|
|
|
|