11   Artículos

 
en línea
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas    
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Jae-Myeong Kim, Min-Gu Kim and Sung-Bum Pan    
With the spread of the modern media industry, harmful genre contents are indiscriminately disseminated to teenagers. The password identification method used to block sensational and violent genre content has become a problem that teenagers can easily ste... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu    
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Vladimir Belsky,Ivan Chizhov,Anastasiya Chichaeva,Vasily Shishkin     Pág. 10 - 26
A physically unclonable function is a hardware device whose instances have several unique parameters and characteristics, i.e. it is impossible to create two instances with identical values of these characteristics due to the properties of the physical p... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Keyong Wang, Mengyao Tong, Dequan Yang and Yuhang Liu    
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the pu... ver más
Revista: Information    Formato: Electrónico

 
en línea
Pavani V L     Pág. pp. 4 - 19
The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The percep... ver más

« Anterior     Página: 1 de 1     Siguiente »