Results 1 to 10 of about 9,696 (109)

Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles [PDF]

open access: yesSensors, 2022
An alternative authentication method to traditional alphanumeric passwords is graphical password authentication, also known as graphical authentication, for which one of the most valuable cued-recall techniques is PassPoints.
Lisset Suárez-Plasencia   +4 more
doaj   +2 more sources

Information Theory Based Evaluation of the RC4 Stream Cipher Outputs [PDF]

open access: yesEntropy, 2021
This paper presents a criterion, based on information theory, to measure the amount of average information provided by the sequences of outputs of the RC4 on the internal state. The test statistic used is the sum of the maximum plausible estimates of the
Evaristo José Madarro-Capó    +3 more
doaj   +2 more sources

Selecting an Effective Entropy Estimator for Short Sequences of Bits and Bytes with Maximum Entropy [PDF]

open access: yesEntropy, 2021
Entropy makes it possible to measure the uncertainty about an information source from the distribution of its output symbols. It is known that the maximum Shannon’s entropy of a discrete source of information is reached when its symbols follow a Uniform ...
Lianet Contreras Rodríguez   +4 more
doaj   +2 more sources

Measuring Independence between Statistical Randomness Tests by Mutual Information [PDF]

open access: yesEntropy, 2020
The analysis of independence between statistical randomness tests has had great attention in the literature recently. Dependency detection between statistical randomness tests allows one to discriminate statistical randomness tests that measure similar ...
Jorge Augusto Karell-Albo   +4 more
doaj   +2 more sources

Ensinando conceitos básicos de criptografia no ensino médio profissional

open access: yesPolítica e Gestão Educacional, 2021
A criptografia está presente em diversas operações realizadas diariamente pelas pessoas, tais como compras online ou no desenvolvimento de diálogos utilizando equipamentos computacionais e a Internet como meio.
Regina Paiva Melo Marin   +2 more
doaj   +1 more source

Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
PassPoint is a graphical authentication technique that is based on the selection of five points in an image. A detected vulnerability lies in the possible existence of a pattern in the points that make up the password. The objective of this work is to detect nonrandom graphical passwords in the PassPoint scenario. A spatial randomness test based on the
Lisset Suárez-Plasencia   +6 more
wiley   +1 more source

Criptografía: un tema de interés en el currículo de matemáticas de secundaria

open access: yesDucere, 2022
Este artículo discute la importancia de desarrollar el trabajo con temas a lo largo del Currículo de Matemáticas de Enseñanza Media, presentando el tema Criptografía como una posibilidad didáctica para explorar un conjunto de situaciones problema que ...
Clarissa de Assis Olgin
doaj   +1 more source

CRIPTOGRAFIA: UMA POSSIBILIDADE PARA O ENSINO DE FUNÇÃO INVERSA

open access: yesRevista REAMEC, 2019
A Criptografia encontra grande aplicabilidade na proteção de informações sigilosas e pode se constituir como motivadora ao processo de ensino e aprendizagem de conceitos matemáticos.
Idemar Vizolli   +2 more
doaj   +1 more source

Other potential problems in Qlink.it

open access: yesJournal of Computer Science and Technology, 2018
In previous work we presented preliminary results obtained by reviewing the source code of Qlink.it web application. In this article, after summarizing previous findings, results of the source code review of Qlink.it Android application will be described.
Antonio Castro Lechtaler   +6 more
doaj   +1 more source

Vulnerabilidades y amenazas en los activos de información

open access: yesRevista Científica de Sistemas e Informática, 2023
Con el avance del tiempo y la tecnología, la seguridad que antes se protegía se vio afectada por múltiples ataques, que en un cierto sentido se creía sin tanta importancia pero que, en la actualidad, es necesario que los datos estén controlados.
Evellyn Milles Duval Guevara-Vega   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy