Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2020 at "Early Childhood Education Journal"
DOI: 10.1007/s10643-020-01067-z
Abstract: Software is developed specifically for children and this often requires them to authenticate themselves, usually by entering a password. Password hygiene is important for children, because the principles they learn in early life will often…
read more here.
Keywords:
books efficacious;
children books;
password related;
children password ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Journal of Computer Science and Technology"
DOI: 10.1007/s11390-018-1810-y
Abstract: Using a password manager is known to be more convenient and secure than not using one, on the assumption that the password manager itself is safe. However recent studies show that most popular password managers…
read more here.
Keywords:
password;
mutually distrusting;
password manager;
manager splitpass ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2869535
Abstract: With regard to the privacy of client–server communication systems, most research works have concentrated on authentication to guarantee security. Among the investigated schemes, two-factor password authentication has been a major focus and has undergone considerable…
read more here.
Keywords:
factor password;
password authentication;
card reader;
authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2872772
Abstract: It has long been recognized, by both security researchers and human–computer interaction researchers, that no silver bullet for authentication exists to achieve security, usability, and memorability. Aiming to achieve the goals, we propose a Multi-fAcet…
read more here.
Keywords:
multi facet;
password scheme;
security;
facet password ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2937030
Abstract: Password-based authentication is the first line of defense of most information systems. Password security concerns the security of the whole information system. Therefore, administrators will formulate corresponding password strategies to help users improve the security…
read more here.
Keywords:
password;
security;
alphapwd password;
password generation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3426605
Abstract: The increasing sensitivity of personal information has led to the widespread adoption of encryption technology for unstructured files and various applications. However, this presents significant challenges for law enforcement agencies tasked with gathering evidence for…
read more here.
Keywords:
password;
hmac;
hmac sha2;
office 2013 ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2025.3601839
Abstract: In AIoT-enabled secure and green supply chain systems (SCSs), robust device authentication measures are crucial to maintaining the integrity of the ecosystem. One key challenge in this context is mitigating password guessing attacks—a scenario that…
read more here.
Keywords:
authentication;
passgat;
password;
attention ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2019.2933464
Abstract: The radical advancement in web services has drawn more attention toward intensifying the security of numerous applications that interact and serve the Internet users. In order to access the different applications on the web, users…
read more here.
Keywords:
authentication;
insider;
insider attack;
password ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2021.3116134
Abstract: Ensuring the security of cloud storage services is an ongoing challenge, due to the increasingly complex and dynamic threat landscape. One particular challenge is how to design security and efficient data encryption approaches. For example,…
read more here.
Keywords:
cloud storage;
storage services;
password;
cloud ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2016.2594789
Abstract: Two-server password-authenticated key exchange allows the client to split a low-entropy password into two pieces and store them in two servers, respectively, and the two servers collaboratively authenticate the client and establish session keys. Even…
read more here.
Keywords:
server password;
authenticated key;
two server;
password authenticated ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Network"
DOI: 10.1109/mnet.101.2000762
Abstract: A password is an important method of identity authentication, so there are endless research attempts on passwords, but most of them are based on different languages and technologies. As far as we know, no one…
read more here.
Keywords:
behavior affect;
password datasets;
ordinary password;
social behavior ... See more keywords