We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities

    Password manager and vault applications can be used by users to select strong passwords as well as storing user credentials locally or in the cloud....
    Aleck Nash, Kim-Kwang Raymond Choo in Digital Forensics and Cyber Crime
    Conference paper 2024
  2. Password Generation Based on Song Lyrics and Its Management

    This paper focuses on creating a Password Manager which is secure and easy-to-remember. Password managers prove efficient in generating and storing...
    E. Sai Kishan, M. Hemchudaesh, ... K. P. Jevitha in Advances in Computing and Data Sciences
    Conference paper 2022
  3. Session-Based Resource Access

    This segment describes how web site keep uses logged in between requests by sending session IDs or access tokens. It also explains the advantages of...
    Video segment 2023
  4. Learning Password Modification Patterns with Recurrent Neural Networks

    The majority of online services continue their reliance on text-based passwords as the primary means of user authentication. With a growing number of...
    Alex Nosenko, Yuan Cheng, Haiquan Chen in Secure Knowledge Management In The Artificial Intelligence Era
    Conference paper 2022
  5. Analysis of Country and Regional User Password Characteristics in Dictionary Attacks

    The degree to which passwords are robust to guessing has become one of the fundamental interests in password research. For example, a method has been...
    Shodai Kurasaki, Akira Kanaoka in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2023
  6. Deep learning-based biometric cryptographic key generation with post-quantum security

    In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on...

    Oleksandr Kuznetsov, Dmytro Zakharov, Emanuele Frontoni in Multimedia Tools and Applications
    Article 14 December 2023
  7. A Hybrid Machine Learning Technique for Multiple Soft Biometric Based Dynamic Keystroke Pattern Recognition System

    Recently, the keystroke biometric authentication system is the notable research area because of it is low cost and flexible integration support....

    V. Shanmugavalli, S. Suresh Kumar, S. Nithya Kalyani in Neural Processing Letters
    Article 20 September 2023
  8. Privacy and Security Perceptions in Augmented Cognition Applications

    Perceptions of security and privacy influence users’ behavior with security mechanisms such as passwords and multifactor authentication. Users tend...
    Michael-Brian Ogawa, Brent Auernheimer, ... Martha E. Crosby in Augmented Cognition
    Conference paper 2023
  9. Choosing Wordlists for Password Guessing: An Adaptive Multi-armed Bandit Approach

    A password guesser often uses wordlists (e.g. lists of previously leaked passwords, dictionaries of words in different languages, and lists of the...
    Hazel Murray, David Malone in Foundations and Practice of Security
    Conference paper Open access 2022
  10. Password Challenges for Older People in China and the United Kingdom

    As vital services are moving increasingly online, it is important that everyone, including older people, can access them. Both high risk and many low...
    Helen Petrie, Burak Merdenyan, Chen **e in Computers Hel** People with Special Needs
    Conference paper 2022
  11. A Security Analysis of Password Managers on Android

    Password Managers are software tools designed to help users easily store and access credentials across devices while also reducing, if not...
    Abhyudaya Sharma, Sweta Mishra in Information Systems Security
    Conference paper 2023
  12. Password based authentication for web based graphics computing services retrieval in cloud

    In the global environment privacy and security issues were critical to handle the huge number of participants. Many security-based research works...

    Eman S. Alkhalifah in Multimedia Tools and Applications
    Article 19 April 2024
  13. User Authentication—Passwords,Biometrics and Alternatives

    Computer users regularly enter a username and password to access a local device or remote account. Authentication is the process of using supporting...
    Paul C. van Oorschot in Computer Security and the Internet
    Chapter 2020
  14. Authentication Technology

    In this chapter, you will learn about how parties (typically human parties) can be identified to a computer system. This process is called...
    Seth James Nielson in Discovering Cybersecurity
    Chapter 2023
  15. The Revenge of Password Crackers: Automated Training of Password Cracking Tools

    Passwords are stored in the form of salted one-way hashes so that attacks on servers cannot leak them in the clear. However, humans tend to select...
    Alessia Michela Di Campi, Riccardo Focardi, Flaminia L. Luccio in Computer Security – ESORICS 2022
    Conference paper 2022
  16. SePass: Semantic Password Guessing Using k-nn Similarity Search in Word Embeddings

    Password guessing describes the process of finding a password for a secured system. Use cases include password recovery, IT forensics and measuring...
    Maximilian Hünemörder, Levin Schäfer, ... Peer Kröger in Advanced Data Mining and Applications
    Conference paper 2022
  17. Introduction

    In 2009, hackers obtained user credentials of over 30 million users of mobile game publisher RockYou. They exploited a SQL injection vulnerability to...
    Chapter 2022
  18. GazeRoomLock: Using Gaze and Head-Pose to Improve the Usability and Observation Resistance of 3D Passwords in Virtual Reality

    Authentication has become an important component of Immersive Virtual Reality (IVR) applications, such as virtual shop** stores, social networks,...
    Ceenu George, Daniel Buschek, ... Mohamed Khamis in Augmented Reality, Virtual Reality, and Computer Graphics
    Conference paper 2020
  19. The importance of social identity on password formulations

    Passwords are regarded as the most common authentication mechanism used by Web-based services, despite large-scale attacks and data breaches...

    Marthie Grobler, M. A. P. Chamikara, ... Cecile Paris in Personal and Ubiquitous Computing
    Article 07 November 2020
  20. A service-categorized security scheme with physical unclonable functions for internet of vehicles

    In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside....

    Nadhir Ben Halima, Ala Saleh Alluhaidan, ... Mohammad Ayoub Khan in Journal of Big Data
    Article Open access 21 December 2023
Did you find what you were looking for? Share feedback.