|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
|
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ...
ver más
|
|
|
|
|
|
|
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h...
ver más
|
|
|
|
|
|
|
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour...
ver más
|
|
|
|
|
|
|
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex...
ver más
|
|
|
|
|
|
|
Jimmy Moedjahedy, Arief Setyanto, Fawaz Khaled Alarfaj and Mohammed Alreshoodi
Internet users are continually exposed to phishing as cybercrime in the 21st century. The objective of phishing is to obtain sensitive information by deceiving a target and using the information for financial gain. The information may include a login det...
ver más
|
|
|
|
|
|
|
Jae-Myeong Kim, Min-Gu Kim and Sung-Bum Pan
With the spread of the modern media industry, harmful genre contents are indiscriminately disseminated to teenagers. The password identification method used to block sensational and violent genre content has become a problem that teenagers can easily ste...
ver más
|
|
|
|
|
|
|
Jin-A Lee and Keun-Chang Kwak
Conventional personal identification methods (ID, password, authorization certificate, etc.) entail various issues, including forgery or loss. Technological advances and the diffusion across industries have enhanced convenience; however, privacy risks du...
ver más
|
|
|
|
|
|
|
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov...
ver más
|
|
|
|
|
|
|
Tony Gwyn, Kaushik Roy and Mustafa Atay
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur...
ver más
|
|
|
|