9   Artículos

 
en línea
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas    
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo    
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jae-Myeong Kim, Min-Gu Kim and Sung-Bum Pan    
With the spread of the modern media industry, harmful genre contents are indiscriminately disseminated to teenagers. The password identification method used to block sensational and violent genre content has become a problem that teenagers can easily ste... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ruti Gafni, Tal Pavel, Raz Margolin, Ben Weiss     Pág. 27 - 41
Passwords are the standard means of registration and access to Websites, information systems, online services and various social networks. Databases are increasingly breached and social engineering is employed to obtain usernames and passwords for online... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

 
en línea
Stephen Mujeye, Yair Levy, Herbert Mattord, Wei Li     Pág. 99 - 116
The demand for information system authentication has significantly increased over the last decade. Research has shown that the majority of user authentications remain to be passwordbased, however, it is well documented that passwords have significant lim... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »