45   Artículos

 
en línea
Sakorn Mekruksavanich and Anuchit Jitpattanakul    
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Argyrios Sideris, Theodora Sanida and Minas Dasygenis    
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke    
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ivan Matveev and Ilia Safonov    
Passwords are ubiquitous in today?s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as inpu... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo    
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas    
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell    
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jackson Horlick Teng, Thian Song Ong, Tee Connie, Kalaiarasi Sonai Muthu Anbananthen and Pa Pa Min    
The finger vein recognition system uses blood vessels inside the finger of an individual for identity verification. The public is in favor of a finger vein recognition system over conventional passwords or ID cards as the biometric technology is harder t... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu    
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »