We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. PassFile: Graphical Password Authentication Based on File Browsing Records

    With the rapid growth of smartphone shipments, it has become a necessity to safeguard the mobile devices from unauthorized access (e.g., in case of...
    Ho Chun Fu, Wenjuan Li, Yu Wang in Machine Learning for Cyber Security
    Conference paper 2024
  2. Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol

    WhatsApp is an end-to-end encrypted (E2EE) messaging service used by billions of people. In late 2021, WhatsApp rolled out a new protocol for backing...
    Gareth T. Davies, Sebastian Faller, ... Tibor Jager in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  3. A service-categorized security scheme with physical unclonable functions for internet of vehicles

    In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside....

    Nadhir Ben Halima, Ala Saleh Alluhaidan, ... Mohammad Ayoub Khan in Journal of Big Data
    Article Open access 21 December 2023
  4. Hours of Horus: Keyless Cryptocurrency Wallets

    We put forth a keyless wallet, a cryptocurrency wallet where money can be spent using a password alone, and no private keys are required. It requires...
    Conference paper 2023
  5. Safely Storing Passwords

    Now that we have covered hashing and authenticated hashing, the next place to explore is the protection and storage of passwords. Passwords are still...
    Chapter 2019
  6. Password Management

    In this chapter, we will look at the storage and management of passwords, both for our users and for accessing services like databases.
    Chapter 2022
  7. “I’m not planning on dying anytime soon!”: A Survey of Digital Legacy Planning

    Increasing technology integration into daily life has broadened the concept of legacy to include the digital footprint individuals leave behind....
    Paola Marmorato, Clarissa Fernandes, ... Elizabeth Stobert in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  8. SecPassInput: Towards Secure Memory and Password Handling in Web Applications

    JavaScript does not provide web applications the ability to overwrite or clear variables of primitive types, such as strings, when they are no longer...
    Pascal Wichmann, August See, Hannes Federrath in ICT Systems Security and Privacy Protection
    Conference paper 2024
  9. Exploring the Landscape of Password Managers for Individual Users Through Innovative Solution

    With the increasing number of online services available, it is crucial for individuals to have control over their password management systems, which...
    Taskeen Zaidi, Suman Garai, Trishul V. Biradar in Information Technology Security
    Chapter 2024
  10. Weak Password Scanning System for Penetration Testing

    Nowadays, many network security related personnel are accustomed to using simple passwords or default passwords set by system. Based on this kind of...
    Bailin **e, Qi Li, Hao Qian in Cyberspace Safety and Security
    Conference paper 2022
  11. Enhanced Pin Entry Mechanism for ATM Machine by Defending Shoulder Surfing Attacks

    Passwords and extraordinary recognizable proof numbers (PINs) are critical and notable strategies for confirmation found in many gadgets, including...
    Yogesh Kisan Mali, Vijay U. Rathod, ... Tushar Waykole in Cyber Security and Digital Forensics
    Conference paper 2024
  12. Bridging the Gap Between Usability and Security: Cultural Adaptation of a Graphical User Authentication

    Authentication tasks are becoming more important, since these tasks are performed daily by millions of users across diverse cultures that share...
    Conference paper 2022
  13. Digital Authentication and Dyslexia: A Survey of the Problems and Needs of Dyslexia People

    It might be expected that people with dyslexia would have difficulties with password creation and maintenance, given their difficulties with...
    Nicole Kelly, Helen Petrie in Computers Hel** People with Special Needs
    Conference paper 2022
  14. Cost-Asymmetric Memory Hard Password Hashing

    In the past decade billions of user passwords have been exposed to the dangerous threat of offline password cracking attacks. An offline attacker who...
    Wenjie Bai, Jeremiah Blocki, Mohammad Hassan Ameri in Security and Cryptography for Networks
    Conference paper 2022
  15. You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults

    It is natural for Internet users to use a password vault to encrypt and manage numerous passwords with a master password. Using one to rule all that...
    Tingting Rao, Yixin Su, ... Hai ** in Computer Security – ESORICS 2023
    Conference paper 2024
  16. Internet of Behavior in Cybersecurity: Opportunities and Challenges

    There is a dark side to the Internet of things, and experts believe that the integration of behavioral data may supply hackers with sensitive...
    Conference paper 2022
  17. Learning Ansible Basic Concepts IV: Users, Roles, Host Variables, Templates, and Password Vault

    This chapter concludes the Ansible concepts series in this book, and we will soon move on to the Network Automation Practical Primer Labs. In this...
    Brendan Choi, Erwin Medina in Introduction to Ansible Network Automation
    Chapter 2023
  18. Conceptual Approach for Multimodal Biometrics FPGA-Based Security System

    Increment of cybersecurity became one of the most important problems that researchers have to deal with it. However, simple passwords or smart cards...
    Maciej Szymkowski, Khalid Saeed in ICT for Engineering & Critical Infrastructures
    Conference paper 2024
  19. Verified Password Generation from Password Composition Policies

    Password managers (PMs) are important tools that enable the use of stronger passwords, freeing users from the cognitive burden of remembering them....
    Miguel Grilo, João Campos, ... Alexandra Mendes in Integrated Formal Methods
    Conference paper 2022
  20. RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient

    The unsupervised neural network GAN can automatically generate synthetic samples conform to the distribution of learned samples. Therefore, password...
    Deng Huang, Yufei Wang, Wen Chen in Security and Privacy in New Computing Environments
    Conference paper 2022
Did you find what you were looking for? Share feedback.