80   Artículos

 
en línea
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu    
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke    
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed    
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo    
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas    
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Jimmy Moedjahedy, Arief Setyanto, Fawaz Khaled Alarfaj and Mohammed Alreshoodi    
Internet users are continually exposed to phishing as cybercrime in the 21st century. The objective of phishing is to obtain sensitive information by deceiving a target and using the information for financial gain. The information may include a login det... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jae-Myeong Kim, Min-Gu Kim and Sung-Bum Pan    
With the spread of the modern media industry, harmful genre contents are indiscriminately disseminated to teenagers. The password identification method used to block sensational and violent genre content has become a problem that teenagers can easily ste... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jin-A Lee and Keun-Chang Kwak    
Conventional personal identification methods (ID, password, authorization certificate, etc.) entail various issues, including forgery or loss. Technological advances and the diffusion across industries have enhanced convenience; however, privacy risks du... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu    
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tony Gwyn, Kaushik Roy and Mustafa Atay    
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »