Results 51 to 60 of about 55,115 (255)
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed
Peng Foong Ho +4 more
doaj +1 more source
A Gateway to the Future or a Mind Trapped in Anxiety? The Transformative Power of Career Resources
ABSTRACT This study explores the indirect impact of employment anxiety on university students’ perceptions of decent work through the serial mediating roles of motivational and environmental career resources. Data were collected from 458 university students in Türkiye using validated scales.
Emre Emrullah Boğazlıyan, Ahmet Ayaz
wiley +1 more source
Can ISO/IEC 17025 serve as a tool to prevent scientific fraud in chemical research laboratories?
Abstract Scientific fraud has been documented across multiple disciplines, and chemistry is no exception. Recent studies indicate that contamination of materials, methodological errors, and unreliable data, results, or analyses account for over 25% of retracted publications.
Flor Monica Gutierrez‐Alcantara
wiley +1 more source
A wireless sensor network (WSN) is used for a smart home system’s backbone that monitors home environment and controls smart home devices to manage lighting, heating, security and surveillance.
Sooyeon Shin, Taekyoung Kwon
doaj +1 more source
ABSTRACT While corporate social responsibility (CSR) scholarship assumes that organizational consistency signals effectiveness, there remains a knowledge gap about how MNCs navigate competing institutional logics between headquarters and subsidiaries. This study investigates how managerial sensemaking mediates the effects of institutional pressures on ...
Charles Antony Diab, Wendy Stubbs
wiley +1 more source
Two-factor authenticated key agreement protocol based on biometric feature and password
A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card ...
Xiao-wei LI +3 more
doaj
Abstract This study explored how lecturers in a post‐92 UK university conceptualise and enact decolonial curriculum principles within their teaching and programme design. Drawing on semi‐structured interviews with academic staff across multiple disciplines, the research adopts a qualitative, phenomenologically informed approach to examine the interplay
Reece Sohdi
wiley +1 more source
Secure password-based authentication scheme with anonymous identity without smart cards
Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with ...
WANG Bang-ju1 +2 more
doaj
This research analyzes password strength based on its length and complexity using brute force attack simulations. The study begins with collecting password data from various sources to ensure sufficient variation in complexity levels. Next, the passwords
Whisnu Yudha Saputra +3 more
doaj +1 more source
Gamified learning in health sciences education: Terminology and considerations
Anatomical Sciences Education, EarlyView.
Jeremy J. Grachan +2 more
wiley +1 more source

