Results 1 to 10 of about 55,115 (255)

A Password Meter without Password Exposure [PDF]

open access: yesSensors, 2021
To meet password selection criteria of a server, a user occasionally needs to provide multiple choices of password candidates to an on-line password meter, but such user-chosen candidates tend to be derived from the user’s previous passwords—the meter ...
Pyung Kim   +3 more
doaj   +3 more sources

Sequence Similarity Measurement Method Based on Symbol Entropy [PDF]

open access: yesJisuanji gongcheng, 2016
Existing sequence similarity measurement algorithms only consider the local similarity of subsequences,ignoring global structure information.Thus,a similarity measurement method based on the entropy of single symbol for sequences is proposed.The entropy ...
ZHANG Hao,CHEN Lifei,GUO Gongde
doaj   +1 more source

PALPAS -- PAssword Less PAssword Synchronization [PDF]

open access: yes2015 10th International Conference on Availability, Reliability and Security, 2015
Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used. Such a database may be subject to unauthorized access which can lead to the disclosure of all passwords by an offline brute-force attack.
Horsch, M., Hülsing, A.T., Buchmann, J.
openaire   +2 more sources

A Scrutiny of Honeyword Generation Methods: Remarks on Strengths and Weaknesses Points

open access: yesCybernetics and Information Technologies, 2022
Honeyword system is a successful password cracking detection system. Simply the honeywords are (False passwords) that are accompanied to the sugarword (Real password).
Yasser Yasser A.   +2 more
doaj   +1 more source

Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13

open access: yesBuana Information Technology and Computer Sciences, 2020
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj   +1 more source

Verified Password Generation from Password Composition Policies

open access: yes, 2022
Password managers (PMs) are important tools that enable the use of stronger passwords, freeing users from the cognitive burden of remembering them. Despite this, there are still many users who do not fully trust PMs. In this paper, we focus on a feature that most PMs offer that might impact the user’s trust, which is the process of generating a random ...
Grilo, Miguel   +4 more
openaire   +2 more sources

An Original Algorithm for Password Encryption [PDF]

open access: yesAnnals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics, 2021
Nowdays the password encryption is an indispensable job used in software developing process in order to secure the important information. In this work it is proposed an original and efficient algorithm capable to encrypt a password.
Dorin BIBICU
doaj   +1 more source

Password protection in IT systems [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2018
The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed.
Przemysław Rodwald, Bartosz Biernacik
doaj   +1 more source

Alphapwd: A Password Generation Strategy Based on Mnemonic Shape

open access: yesIEEE Access, 2019
Password-based authentication is the first line of defense of most information systems. Password security concerns the security of the whole information system.
Jianhua Song   +3 more
doaj   +1 more source

Dynamic ID-based remote user authentication scheme using ElGamal encryption system

open access: yesNova Scientia, 2016
We propose a new dynamic ID-based remote user authentication scheme using smart cards, which it is based on one-way hash function, ElGamal’s public key cryptosystem and nonce.
Rafael Martínez Peláez   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy