Results 51 to 60 of about 55,115 (255)

Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information

open access: yesThe Scientific World Journal, 2014
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed
Peng Foong Ho   +4 more
doaj   +1 more source

A Gateway to the Future or a Mind Trapped in Anxiety? The Transformative Power of Career Resources

open access: yesThe Career Development Quarterly, EarlyView.
ABSTRACT This study explores the indirect impact of employment anxiety on university students’ perceptions of decent work through the serial mediating roles of motivational and environmental career resources. Data were collected from 458 university students in Türkiye using validated scales.
Emre Emrullah Boğazlıyan, Ahmet Ayaz
wiley   +1 more source

Can ISO/IEC 17025 serve as a tool to prevent scientific fraud in chemical research laboratories?

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract Scientific fraud has been documented across multiple disciplines, and chemistry is no exception. Recent studies indicate that contamination of materials, methodological errors, and unreliable data, results, or analyses account for over 25% of retracted publications.
Flor Monica Gutierrez‐Alcantara
wiley   +1 more source

A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes

open access: yesSensors, 2019
A wireless sensor network (WSN) is used for a smart home system’s backbone that monitors home environment and controls smart home devices to manage lighting, heating, security and surveillance.
Sooyeon Shin, Taekyoung Kwon
doaj   +1 more source

Sensemaking and CSR Character in Multinational Corporations: A Comparative Study of Headquarters and Subsidiary Practices in the UAE

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT While corporate social responsibility (CSR) scholarship assumes that organizational consistency signals effectiveness, there remains a knowledge gap about how MNCs navigate competing institutional logics between headquarters and subsidiaries. This study investigates how managerial sensemaking mediates the effects of institutional pressures on ...
Charles Antony Diab, Wendy Stubbs
wiley   +1 more source

Two-factor authenticated key agreement protocol based on biometric feature and password

open access: yesTongxin xuebao, 2017
A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card ...
Xiao-wei LI   +3 more
doaj  

Local realities, global discourses and decolonising the curriculum in a post‐92 UK context: Academic voices on enacting decolonial curriculum change

open access: yesThe Curriculum Journal, EarlyView.
Abstract This study explored how lecturers in a post‐92 UK university conceptualise and enact decolonial curriculum principles within their teaching and programme design. Drawing on semi‐structured interviews with academic staff across multiple disciplines, the research adopts a qualitative, phenomenologically informed approach to examine the interplay
Reece Sohdi
wiley   +1 more source

Secure password-based authentication scheme with anonymous identity without smart cards

open access: yesTongxin xuebao, 2008
Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with ...
WANG Bang-ju1   +2 more
doaj  

PASSWORD STRENGTH STUDY USING THE ZXCVBN ALGORITHM AND BRUTE-FORCE TIME ESTIMATION TO STRENGTHEN CYBERSECURITY

open access: yesPilar Nusa Mandiri
This research analyzes password strength based on its length and complexity using brute force attack simulations. The study begins with collecting password data from various sources to ensure sufficient variation in complexity levels. Next, the passwords
Whisnu Yudha Saputra   +3 more
doaj   +1 more source

Gamified learning in health sciences education: Terminology and considerations

open access: yes
Anatomical Sciences Education, EarlyView.
Jeremy J. Grachan   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy