Results 21 to 30 of about 55,115 (255)
Password Guessing Model Based on Reinforcement Learning [PDF]
Password guessing is an important research direction in password security.Password guessing based on generative adversarial network(GAN) is a new method proposed in recent years,which guides the update of the generator according to evaluation results on ...
LI Xiaoling, WU Haotian, ZHOU Tao, LU Hui
doaj +1 more source
Password Cracking Algorithm Based on Markov Chain [PDF]
Password cracking is one of the key techniques of electronic forensics.In order to overcome the problem of “length firewall” in password cracking,based on Markov chain,a password cracking algorithm is proposed.The password space is truncated by ...
AN Yawei,LUO Shun,ZHU Zhihui
doaj +1 more source
Object Lessons is a series of short, beautifully designed books about the hidden lives of ordinary things. Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What’s an ‘identity theft’ in the digital age if not the unauthorized use
openaire +4 more sources
Implementation of shared file encrypted storage hierarchical access control scheme
The traditional file sharing way is single,lack of security,and the shared file's permission autonomous control is too high.To solve these problems,a file encrypted storage and hierarchical access control scheme was proposed.Through increasing ...
Li LI +3 more
doaj +3 more sources
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes.
I-Pin Chang +3 more
doaj +1 more source
Password Managers—It’s All about Trust and Transparency
A password is considered to be the first line of defence in protecting online accounts, but there are problems when people handle their own passwords, for example, password reuse and difficult to memorize.
Fahad Alodhyani +2 more
doaj +1 more source
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai +9 more
wiley +1 more source
The frequent incidents of password leakage have increased people’s attention and research on password security. Password guessing is an essential part of password cracking and password security research.
Junbin Ye +4 more
doaj +1 more source
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture,
Muath Obaidat +3 more
doaj +1 more source

