Results 211 to 220 of about 55,115 (255)

Cultural Adaptation of a Digital Mobile App for Bipolar Disorder (PolarUs): Protocol for a Qualitative Co-Design Study.

open access: yesJMIR Res Protoc
Chau LW   +6 more
europepmc   +1 more source

On password strength measurements: Password entropy and password quality

2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
In this paper, we propose a new algorithm to compute the strength of passwords based on two measurements, mainly: password entropy and password quality. The passwords considered by the algorithm consist of eight characters alpha numeric with special characters. For such passwords, the analysis phase identified the low/high entropy patterns and low/high
Mariam. M. Taha   +4 more
openaire   +1 more source

Password Entropy and Password Quality

2010 Fourth International Conference on Network and System Security, 2010
Passwords are the first line of defense for many computerized systems. The quality of these passwords decides the security strength of these systems. Many studies advocate using password entropy as an indicator for password quality where lower entropy suggests a weaker or less secure password. However, a closer examination of this literature shows that
Wanli Ma   +3 more
openaire   +1 more source

A hidden-password online password manager

Proceedings of the 36th Annual ACM Symposium on Applied Computing, 2021
The most commonly adopted password management technique is to store web account passwords on a password manager and lock them using a master password. However, current online password managers do not hide the account passwords or the master password from the password manager itself, which highlights their real-world vulnerability and lack of user ...
Maliheh Shirvanian   +5 more
openaire   +1 more source

Password Strength Measurement without Password Disclosure

2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 2019
As a mechanism for promoting improvement in the strength of the user password, there is a mechanism that measures the password strength and gives feedback to the user. There are a wide variety of current strength measurement methods, and there are also methods that transmit a password during input to the remote server to perform strength measurement ...
Taku Sugai   +3 more
openaire   +1 more source

PASSWORD KNOWLEDGE VERSUS PASSWORD MANAGEMENT

i-manager's Journal on Computer Science, 2018
N. ADAMA VICTOR   +4 more
openaire   +1 more source

Neuromuscular Password-Based User Authentication

IEEE Transactions on Industrial Informatics, 2021
Xinyu Jiang, Ke Xu, Chenyun Dai
exaly  

Home - About - Disclaimer - Privacy