13   Artículos

 
en línea
Sakorn Mekruksavanich and Anuchit Jitpattanakul    
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas    
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Jackson Horlick Teng, Thian Song Ong, Tee Connie, Kalaiarasi Sonai Muthu Anbananthen and Pa Pa Min    
The finger vein recognition system uses blood vessels inside the finger of an individual for identity verification. The public is in favor of a finger vein recognition system over conventional passwords or ID cards as the biometric technology is harder t... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Tsung-Hung Lin and Ming-Te Chen    
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tampere... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fatima Salahdine and Naima Kaabouch    
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the securit... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ruti Gafni, Tal Pavel, Raz Margolin, Ben Weiss     Pág. 27 - 41
Passwords are the standard means of registration and access to Websites, information systems, online services and various social networks. Databases are increasingly breached and social engineering is employed to obtain usernames and passwords for online... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

 
en línea
Cynthia L. Knott, G. Steube    
Increasing concerns about security and privacy have raised the bar for interest in ways to protect information. Although newer approaches include face recognition, the use of passwords is commonly used today as the best approach for protecting data. Web ... ver más

« Anterior     Página: 1 de 1     Siguiente »