Search
Search Results
-
PassFile: Graphical Password Authentication Based on File Browsing Records
With the rapid growth of smartphone shipments, it has become a necessity to safeguard the mobile devices from unauthorized access (e.g., in case of... -
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
WhatsApp is an end-to-end encrypted (E2EE) messaging service used by billions of people. In late 2021, WhatsApp rolled out a new protocol for backing... -
A service-categorized security scheme with physical unclonable functions for internet of vehicles
In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside....
-
Hours of Horus: Keyless Cryptocurrency Wallets
We put forth a keyless wallet, a cryptocurrency wallet where money can be spent using a password alone, and no private keys are required. It requires... -
Safely Storing Passwords
Now that we have covered hashing and authenticated hashing, the next place to explore is the protection and storage of passwords. Passwords are still... -
Password Management
In this chapter, we will look at the storage and management of passwords, both for our users and for accessing services like databases. -
“I’m not planning on dying anytime soon!”: A Survey of Digital Legacy Planning
Increasing technology integration into daily life has broadened the concept of legacy to include the digital footprint individuals leave behind.... -
SecPassInput: Towards Secure Memory and Password Handling in Web Applications
JavaScript does not provide web applications the ability to overwrite or clear variables of primitive types, such as strings, when they are no longer... -
Exploring the Landscape of Password Managers for Individual Users Through Innovative Solution
With the increasing number of online services available, it is crucial for individuals to have control over their password management systems, which... -
Weak Password Scanning System for Penetration Testing
Nowadays, many network security related personnel are accustomed to using simple passwords or default passwords set by system. Based on this kind of... -
Enhanced Pin Entry Mechanism for ATM Machine by Defending Shoulder Surfing Attacks
Passwords and extraordinary recognizable proof numbers (PINs) are critical and notable strategies for confirmation found in many gadgets, including... -
Bridging the Gap Between Usability and Security: Cultural Adaptation of a Graphical User Authentication
Authentication tasks are becoming more important, since these tasks are performed daily by millions of users across diverse cultures that share... -
Digital Authentication and Dyslexia: A Survey of the Problems and Needs of Dyslexia People
It might be expected that people with dyslexia would have difficulties with password creation and maintenance, given their difficulties with... -
Cost-Asymmetric Memory Hard Password Hashing
In the past decade billions of user passwords have been exposed to the dangerous threat of offline password cracking attacks. An offline attacker who... -
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults
It is natural for Internet users to use a password vault to encrypt and manage numerous passwords with a master password. Using one to rule all that... -
Internet of Behavior in Cybersecurity: Opportunities and Challenges
There is a dark side to the Internet of things, and experts believe that the integration of behavioral data may supply hackers with sensitive... -
Learning Ansible Basic Concepts IV: Users, Roles, Host Variables, Templates, and Password Vault
This chapter concludes the Ansible concepts series in this book, and we will soon move on to the Network Automation Practical Primer Labs. In this... -
Conceptual Approach for Multimodal Biometrics FPGA-Based Security System
Increment of cybersecurity became one of the most important problems that researchers have to deal with it. However, simple passwords or smart cards... -
Verified Password Generation from Password Composition Policies
Password managers (PMs) are important tools that enable the use of stronger passwords, freeing users from the cognitive burden of remembering them.... -
RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient
The unsupervised neural network GAN can automatically generate synthetic samples conform to the distribution of learned samples. Therefore, password...