Results 11 to 20 of about 55,115 (255)
The integration of 5G networks and wireless sensor networks (WSNs) is critical in the new era of the Internet of Things (IoT), for a wide range of applications.
Sooyeon Shin, Taekyoung Kwon
doaj +1 more source
A Proposal for Honeyword Generation via Meerkat Clan Algorithm
An effective password cracking detection system is the honeyword system. The Honeyword method attempts to increase the security of hashed passwords by making password cracking easier to detect.
Yasser Yasser A. +2 more
doaj +1 more source
Password Guessing Method Based on Improved PCFG Algorithm [PDF]
Recently,password leaks have been occurring frequently. Accordingly,effective password guessing methods are an important means of securing passwords,among them,the method based on Probabilistic Context-Free Grammar(PCFG) is extremely effective.
LI Jingwen, ZHAO Kui
doaj +1 more source
SMART HOME SECURITY SYSTEM BERBASIS MIKROKONTROLER
Tingginya tindak kejahatan pencurian di rumah tangga perlu diantisipasi dengan penggunaan sistem keamanan rumah yang modern, salah satunya yaitu smart home. Salah satu penerapan smart home berupa safety system.
Jalu Wardoyo +2 more
doaj +1 more source
Fingerprint Password Method Provides Improved Accuracy over Token-based Authentication for Efficient and Secure File Transfers [PDF]
The goal of this study is to improve the accuracy of secure file transfer by proposing and evaluating a novel fingerprint password method in comparison to the existing token-based authentication method.In this study, a dataset of 20 samples was obtained ...
Rithvik R.K., Mohan A.
doaj +1 more source
Privacy and security of patient data in the pathology laboratory
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data.
Ioan C Cucoranu +8 more
doaj +1 more source
Efficient three-party authenticated key agreement protocol based on chaotic map
Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes ...
Xiong LI +3 more
doaj +3 more sources
Understanding Server Authentication in WPA3 Enterprise
In December 2019, the Wi-Fi Alliance published version 2 of WPA3, the new certification program for Wi-Fi devices that updates WPA2. This new version of WPA3 addresses, amongst other things, one of the crucial weaknesses of WPA2: in many practical ...
Alberto Bartoli
doaj +1 more source
MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM [PDF]
Password is one of the most important methods of user authentication.Using effective password guessing methods to improve the hit rate of password attacks is the main approach to study password security.In recent years, researchers have proposed to use ...
CHANG Geng, ZHAO Lan, CHEN Wen
doaj +1 more source
Teknologi informasi saat ini terus berkembang seiring dengan kebutuhan manusia yang menginginkan kemudahan, kecepatandan keakuratan serta keamanan dalam memperoleh informasi. Jaringan wireless sangat dibutuhkan.
Muhammad Yanuar Efendi, Imam Riadi
doaj +1 more source

