|
|
|
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex...
ver más
|
|
|
|
|
|
|
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour...
ver más
|
|
|
|
|
|
|
Jae-Myeong Kim, Min-Gu Kim and Sung-Bum Pan
With the spread of the modern media industry, harmful genre contents are indiscriminately disseminated to teenagers. The password identification method used to block sensational and violent genre content has become a problem that teenagers can easily ste...
ver más
|
|
|
|
|
|
|
Ruti Gafni, Tal Pavel, Raz Margolin, Ben Weiss
Pág. 27 - 41
Passwords are the standard means of registration and access to Websites, information systems, online services and various social networks. Databases are increasingly breached and social engineering is employed to obtain usernames and passwords for online...
ver más
|
|
|
|
|
|
|
Stephen Mujeye, Yair Levy, Herbert Mattord, Wei Li
Pág. 99 - 116
The demand for information system authentication has significantly increased over the last decade. Research has shown that the majority of user authentications remain to be passwordbased, however, it is well documented that passwords have significant lim...
ver más
|
|
|
|