25   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Ruti Gafni, Tal Pavel, Raz Margolin, Ben Weiss     Pág. 27 - 41
Passwords are the standard means of registration and access to Websites, information systems, online services and various social networks. Databases are increasingly breached and social engineering is employed to obtain usernames and passwords for online... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

 
en línea
Cynthia L. Knott, G. Steube    
Increasing concerns about security and privacy have raised the bar for interest in ways to protect information. Although newer approaches include face recognition, the use of passwords is commonly used today as the best approach for protecting data. Web ... ver más

 
en línea
Pavel Lozhnikov, Alexey Sulavko, Alexander Eremenko and Danil Volkov    
-
Revista: Information    Formato: Electrónico

 
en línea
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo    
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas    
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu    
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kay Bryant,John Campbell    
Control mechanisms established on the boundary of an information system are an important preliminary step to minimising losses from security breaches. The primary function of such controls is to restrict the use of information systems and resources to au... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

 
en línea
D. O. Ostapets,V. Lapin     Pág. 249 - 254
The identification / authentication subsystem architecture of information systems is considered; the analysis of their demerits is done. Advisability of using the onetime passwords generation systems is shown. The software complex of onetime passwords ge... ver más
Revista: Nauka ta Progres Transportu    Formato: Electrónico

 
en línea
Stephen Mujeye, Yair Levy, Herbert Mattord, Wei Li     Pág. 99 - 116
The demand for information system authentication has significantly increased over the last decade. Research has shown that the majority of user authentications remain to be passwordbased, however, it is well documented that passwords have significant lim... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

 
en línea
Fahad Alodhyani, George Theodorakopoulos and Philipp Reinecke    
A password is considered to be the first line of defence in protecting online accounts, but there are problems when people handle their own passwords, for example, password reuse and difficult to memorize. Password managers appear to be a promising solut... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ali A. Yassin, Jian Yao and Shiyao Han    
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu?Zhu?Feng scheme and indicate many shortcomi... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Sakorn Mekruksavanich and Anuchit Jitpattanakul    
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tsung-Hung Lin and Ming-Te Chen    
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tampere... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fatima Salahdine and Naima Kaabouch    
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the securit... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ghizlane MOUKHLISS,Olaf MALASSE,RedaFilali Hilali,Hicham Belhadaoui    
Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the m... ver más

 
en línea
Argyrios Sideris, Theodora Sanida and Minas Dasygenis    
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke    
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ivan Matveev and Ilia Safonov    
Passwords are ubiquitous in today?s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as inpu... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell    
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »