|
|
|
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex...
ver más
|
|
|
|
|
|
|
Jae-Myeong Kim, Min-Gu Kim and Sung-Bum Pan
With the spread of the modern media industry, harmful genre contents are indiscriminately disseminated to teenagers. The password identification method used to block sensational and violent genre content has become a problem that teenagers can easily ste...
ver más
|
|
|
|
|
|
|
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov...
ver más
|
|
|
|
|
|
|
Keyong Wang, Mengyao Tong, Dequan Yang and Yuhang Liu
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the pu...
ver más
|
|
|
|
|
|
|
Vladimir Belsky,Ivan Chizhov,Anastasiya Chichaeva,Vasily Shishkin
Pág. 10 - 26
A physically unclonable function is a hardware device whose instances have several unique parameters and characteristics, i.e. it is impossible to create two instances with identical values of these characteristics due to the properties of the physical p...
ver más
|
|
|
|
|
|
|
Pavani V L
Pág. pp. 4 - 19
The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The percep...
ver más
|
|
|
|