Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles [PDF]
An alternative authentication method to traditional alphanumeric passwords is graphical password authentication, also known as graphical authentication, for which one of the most valuable cued-recall techniques is PassPoints.
Lisset Suárez-Plasencia +4 more
doaj +2 more sources
Information Theory Based Evaluation of the RC4 Stream Cipher Outputs [PDF]
This paper presents a criterion, based on information theory, to measure the amount of average information provided by the sequences of outputs of the RC4 on the internal state. The test statistic used is the sum of the maximum plausible estimates of the
Evaristo José Madarro-Capó +3 more
doaj +2 more sources
Selecting an Effective Entropy Estimator for Short Sequences of Bits and Bytes with Maximum Entropy [PDF]
Entropy makes it possible to measure the uncertainty about an information source from the distribution of its output symbols. It is known that the maximum Shannon’s entropy of a discrete source of information is reached when its symbols follow a Uniform ...
Lianet Contreras Rodríguez +4 more
doaj +2 more sources
Measuring Independence between Statistical Randomness Tests by Mutual Information [PDF]
The analysis of independence between statistical randomness tests has had great attention in the literature recently. Dependency detection between statistical randomness tests allows one to discriminate statistical randomness tests that measure similar ...
Jorge Augusto Karell-Albo +4 more
doaj +2 more sources
Ensinando conceitos básicos de criptografia no ensino médio profissional
A criptografia está presente em diversas operações realizadas diariamente pelas pessoas, tais como compras online ou no desenvolvimento de diálogos utilizando equipamentos computacionais e a Internet como meio.
Regina Paiva Melo Marin +2 more
doaj +1 more source
Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles
PassPoint is a graphical authentication technique that is based on the selection of five points in an image. A detected vulnerability lies in the possible existence of a pattern in the points that make up the password. The objective of this work is to detect nonrandom graphical passwords in the PassPoint scenario. A spatial randomness test based on the
Lisset Suárez-Plasencia +6 more
wiley +1 more source
Criptografía: un tema de interés en el currículo de matemáticas de secundaria
Este artículo discute la importancia de desarrollar el trabajo con temas a lo largo del Currículo de Matemáticas de Enseñanza Media, presentando el tema Criptografía como una posibilidad didáctica para explorar un conjunto de situaciones problema que ...
Clarissa de Assis Olgin
doaj +1 more source
CRIPTOGRAFIA: UMA POSSIBILIDADE PARA O ENSINO DE FUNÇÃO INVERSA
A Criptografia encontra grande aplicabilidade na proteção de informações sigilosas e pode se constituir como motivadora ao processo de ensino e aprendizagem de conceitos matemáticos.
Idemar Vizolli +2 more
doaj +1 more source
Other potential problems in Qlink.it
In previous work we presented preliminary results obtained by reviewing the source code of Qlink.it web application. In this article, after summarizing previous findings, results of the source code review of Qlink.it Android application will be described.
Antonio Castro Lechtaler +6 more
doaj +1 more source
Vulnerabilidades y amenazas en los activos de información
Con el avance del tiempo y la tecnología, la seguridad que antes se protegía se vio afectada por múltiples ataques, que en un cierto sentido se creía sin tanta importancia pero que, en la actualidad, es necesario que los datos estén controlados.
Evellyn Milles Duval Guevara-Vega +2 more
doaj +1 more source

