Results 11 to 20 of about 55,115 (255)

Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks

open access: yesIEEE Access, 2018
The integration of 5G networks and wireless sensor networks (WSNs) is critical in the new era of the Internet of Things (IoT), for a wide range of applications.
Sooyeon Shin, Taekyoung Kwon
doaj   +1 more source

A Proposal for Honeyword Generation via Meerkat Clan Algorithm

open access: yesCybernetics and Information Technologies, 2022
An effective password cracking detection system is the honeyword system. The Honeyword method attempts to increase the security of hashed passwords by making password cracking easier to detect.
Yasser Yasser A.   +2 more
doaj   +1 more source

Password Guessing Method Based on Improved PCFG Algorithm [PDF]

open access: yesJisuanji gongcheng, 2023
Recently,password leaks have been occurring frequently. Accordingly,effective password guessing methods are an important means of securing passwords,among them,the method based on Probabilistic Context-Free Grammar(PCFG) is extremely effective.
LI Jingwen, ZHAO Kui
doaj   +1 more source

SMART HOME SECURITY SYSTEM BERBASIS MIKROKONTROLER

open access: yesSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2019
Tingginya tindak kejahatan pencurian di rumah tangga perlu diantisipasi dengan penggunaan sistem keamanan rumah yang modern, salah satunya yaitu smart home. Salah satu penerapan smart home berupa safety system.
Jalu Wardoyo   +2 more
doaj   +1 more source

Fingerprint Password Method Provides Improved Accuracy over Token-based Authentication for Efficient and Secure File Transfers [PDF]

open access: yesE3S Web of Conferences
The goal of this study is to improve the accuracy of secure file transfer by proposing and evaluating a novel fingerprint password method in comparison to the existing token-based authentication method.In this study, a dataset of 20 samples was obtained ...
Rithvik R.K., Mohan A.
doaj   +1 more source

Privacy and security of patient data in the pathology laboratory

open access: yesJournal of Pathology Informatics, 2013
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data.
Ioan C Cucoranu   +8 more
doaj   +1 more source

Efficient three-party authenticated key agreement protocol based on chaotic map

open access: yes网络与信息安全学报, 2016
Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes ...
Xiong LI   +3 more
doaj   +3 more sources

Understanding Server Authentication in WPA3 Enterprise

open access: yesApplied Sciences, 2020
In December 2019, the Wi-Fi Alliance published version 2 of WPA3, the new certification program for Wi-Fi devices that updates WPA2. This new version of WPA3 addresses, amongst other things, one of the crucial weaknesses of WPA2: in many practical ...
Alberto Bartoli
doaj   +1 more source

MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM [PDF]

open access: yesJisuanji kexue, 2022
Password is one of the most important methods of user authentication.Using effective password guessing methods to improve the hit rate of password attacks is the main approach to study password security.In recent years, researchers have proposed to use ...
CHANG Geng, ZHAO Lan, CHEN Wen
doaj   +1 more source

Analisis Perbandingan Metode Keamanan Wireless WEP 128bit Dan WPA Untuk Meningkatkan Keamanan Wireless

open access: yesJurnal Sarjana Teknik Informatika, 2019
Teknologi informasi saat ini terus berkembang seiring dengan kebutuhan manusia yang menginginkan kemudahan, kecepatandan keakuratan serta keamanan dalam memperoleh informasi. Jaringan wireless sangat dibutuhkan.
Muhammad Yanuar Efendi, Imam Riadi
doaj   +1 more source

Home - About - Disclaimer - Privacy