Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2020 at "Early Childhood Education Journal"
DOI: 10.1007/s10643-020-01067-z
Abstract: Software is developed specifically for children and this often requires them to authenticate themselves, usually by entering a password. Password hygiene is important for children, because the principles they learn in early life will often…
read more here.
Keywords:
books efficacious;
children books;
password related;
children password ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Journal of Computer Science and Technology"
DOI: 10.1007/s11390-018-1810-y
Abstract: Using a password manager is known to be more convenient and secure than not using one, on the assumption that the password manager itself is safe. However recent studies show that most popular password managers…
read more here.
Keywords:
password;
mutually distrusting;
password manager;
manager splitpass ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2869535
Abstract: With regard to the privacy of client–server communication systems, most research works have concentrated on authentication to guarantee security. Among the investigated schemes, two-factor password authentication has been a major focus and has undergone considerable…
read more here.
Keywords:
factor password;
password authentication;
card reader;
authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2872772
Abstract: It has long been recognized, by both security researchers and human–computer interaction researchers, that no silver bullet for authentication exists to achieve security, usability, and memorability. Aiming to achieve the goals, we propose a Multi-fAcet…
read more here.
Keywords:
multi facet;
password scheme;
security;
facet password ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2937030
Abstract: Password-based authentication is the first line of defense of most information systems. Password security concerns the security of the whole information system. Therefore, administrators will formulate corresponding password strategies to help users improve the security…
read more here.
Keywords:
password;
security;
alphapwd password;
password generation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2019.2933464
Abstract: The radical advancement in web services has drawn more attention toward intensifying the security of numerous applications that interact and serve the Internet users. In order to access the different applications on the web, users…
read more here.
Keywords:
authentication;
insider;
insider attack;
password ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2021.3116134
Abstract: Ensuring the security of cloud storage services is an ongoing challenge, due to the increasingly complex and dynamic threat landscape. One particular challenge is how to design security and efficient data encryption approaches. For example,…
read more here.
Keywords:
cloud storage;
storage services;
password;
cloud ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2016.2594789
Abstract: Two-server password-authenticated key exchange allows the client to split a low-entropy password into two pieces and store them in two servers, respectively, and the two servers collaboratively authenticate the client and establish session keys. Even…
read more here.
Keywords:
server password;
authenticated key;
two server;
password authenticated ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Network"
DOI: 10.1109/mnet.101.2000762
Abstract: A password is an important method of identity authentication, so there are endless research attempts on passwords, but most of them are based on different languages and technologies. As far as we know, no one…
read more here.
Keywords:
behavior affect;
password datasets;
ordinary password;
social behavior ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Network"
DOI: 10.1109/mnet.2019.1900033
Abstract: With the continuous development of authentication approaches, password-based authentication is still the first choice for various online services today. The security of password-based authentication relies heavily on the strength of the passwords created by users.…
read more here.
Keywords:
based semantic;
password enhancement;
password;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2023 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2022.3197077
Abstract: There has been a growing demand for energy efficient and high performance password recovery systems. As password generation and password validation are two integral components of any password recovery system, the former yet lags behind…
read more here.
Keywords:
system;
rule;
password;
password recovery ... See more keywords