Results 21 to 30 of about 55,115 (255)

Password Guessing Model Based on Reinforcement Learning [PDF]

open access: yesJisuanji kexue, 2023
Password guessing is an important research direction in password security.Password guessing based on generative adversarial network(GAN) is a new method proposed in recent years,which guides the update of the generator according to evaluation results on ...
LI Xiaoling, WU Haotian, ZHOU Tao, LU Hui
doaj   +1 more source

Password Cracking Algorithm Based on Markov Chain [PDF]

open access: yesJisuanji gongcheng, 2018
Password cracking is one of the key techniques of electronic forensics.In order to overcome the problem of “length firewall” in password cracking,based on Markov chain,a password cracking algorithm is proposed.The password space is truncated by ...
AN Yawei,LUO Shun,ZHU Zhihui
doaj   +1 more source

password

open access: yes, 2016
Object Lessons is a series of short, beautifully designed books about the hidden lives of ordinary things. Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What’s an ‘identity theft’ in the digital age if not the unauthorized use
openaire   +4 more sources

Implementation of shared file encrypted storage hierarchical access control scheme

open access: yes网络与信息安全学报, 2016
The traditional file sharing way is single,lack of security,and the shared file's permission autonomous control is too high.To solve these problems,a file encrypted storage and hierarchical access control scheme was proposed.Through increasing ...
Li LI   +3 more
doaj   +3 more sources

Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks

open access: yesSensors, 2015
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes.
I-Pin Chang   +3 more
doaj   +1 more source

Password Managers—It’s All about Trust and Transparency

open access: yesFuture Internet, 2020
A password is considered to be the first line of defence in protecting online accounts, but there are problems when people handle their own passwords, for example, password reuse and difficult to memorize.
Fahad Alodhyani   +2 more
doaj   +1 more source

Synergistic Pyro‐Phototronics and Structural Anisotropy in CsAg2I3/GaN Heterostructures for High‐Performance Polarization‐Sensitive UV Photodetectors

open access: yesAdvanced Science, EarlyView.
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai   +9 more
wiley   +1 more source

PassTCN-PPLL: A Password Guessing Model Based on Probability Label Learning and Temporal Convolutional Neural Network

open access: yesSensors, 2022
The frequent incidents of password leakage have increased people’s attention and research on password security. Password guessing is an essential part of password cracking and password security research.
Junbin Ye   +4 more
doaj   +1 more source

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication

open access: yesSensors, 2020
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture,
Muath Obaidat   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy