Results 1 to 10 of about 55,115 (255)
A Password Meter without Password Exposure [PDF]
To meet password selection criteria of a server, a user occasionally needs to provide multiple choices of password candidates to an on-line password meter, but such user-chosen candidates tend to be derived from the user’s previous passwords—the meter ...
Pyung Kim +3 more
doaj +3 more sources
Sequence Similarity Measurement Method Based on Symbol Entropy [PDF]
Existing sequence similarity measurement algorithms only consider the local similarity of subsequences,ignoring global structure information.Thus,a similarity measurement method based on the entropy of single symbol for sequences is proposed.The entropy ...
ZHANG Hao,CHEN Lifei,GUO Gongde
doaj +1 more source
PALPAS -- PAssword Less PAssword Synchronization [PDF]
Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used. Such a database may be subject to unauthorized access which can lead to the disclosure of all passwords by an offline brute-force attack.
Horsch, M., Hülsing, A.T., Buchmann, J.
openaire +2 more sources
A Scrutiny of Honeyword Generation Methods: Remarks on Strengths and Weaknesses Points
Honeyword system is a successful password cracking detection system. Simply the honeywords are (False passwords) that are accompanied to the sugarword (Real password).
Yasser Yasser A. +2 more
doaj +1 more source
Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj +1 more source
Verified Password Generation from Password Composition Policies
Password managers (PMs) are important tools that enable the use of stronger passwords, freeing users from the cognitive burden of remembering them. Despite this, there are still many users who do not fully trust PMs. In this paper, we focus on a feature that most PMs offer that might impact the user’s trust, which is the process of generating a random ...
Grilo, Miguel +4 more
openaire +2 more sources
An Original Algorithm for Password Encryption [PDF]
Nowdays the password encryption is an indispensable job used in software developing process in order to secure the important information. In this work it is proposed an original and efficient algorithm capable to encrypt a password.
Dorin BIBICU
doaj +1 more source
Password protection in IT systems [PDF]
The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed.
Przemysław Rodwald, Bartosz Biernacik
doaj +1 more source
Alphapwd: A Password Generation Strategy Based on Mnemonic Shape
Password-based authentication is the first line of defense of most information systems. Password security concerns the security of the whole information system.
Jianhua Song +3 more
doaj +1 more source
Dynamic ID-based remote user authentication scheme using ElGamal encryption system
We propose a new dynamic ID-based remote user authentication scheme using smart cards, which it is based on one-way hash function, ElGamal’s public key cryptosystem and nonce.
Rafael Martínez Peláez +3 more
doaj +1 more source

