Results 81 to 90 of about 55,115 (255)
Research on multi-granularity password analysis based on LLM
Password-based authentication has been widely used as the primary authentication mechanism.However, occasional large-scale password leaks have highlighted the vulnerability of passwords to risks such as guessing or theft.In recent years, research on ...
Meng HONG, Weidong QIU, Yangde WANG
doaj +3 more sources
Password authentication scheme for mobile computing environment
By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be ...
LIU Jun +3 more
doaj
Detecting Password File Theft using Predefined Time-Delays between Certain Password Characters
This paper presents novel mechanisms that effectively detect password file thefts and at the same time prevent uncovering passwords. The proposed mechanism uses delay between consecutive keystrokes of the password characters.
Khaled Walid Mahmoud +2 more
doaj +1 more source
Incident‐Based Storytelling in Service‐Learning: Dental Learners’ Experiences and Key Insights
Abstract Background Community service‐learning (CSL) is increasingly used in education to promote oral health equity and social responsibility; however, few studies have examined how reflective incident‐based storytelling narratives shape learner development within CSL contexts.
Abbas Jessani
wiley +1 more source
Impact of a Modular Escape Game on Undergraduate and Continuing Dental Education
ABSTRACT Purpose This study aimed to assess the educational impact and perceived relevance of a pedagogical escape game designed to reinforce key concepts related to dental biomaterials. Methods In 2023, a modular escape game comprising four mandatory stations and one bonus station was developed and integrated into two pedagogical settings: a ...
Sara Bergman +24 more
wiley +1 more source
SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm
Identity authentication is a main line of defense for network security, and passwords have long been the mainstream of identity authentication. In the field of password security research, large-scale password datasets have played an important role in the
Mengli Zhang +5 more
doaj +1 more source
ABSTRACT Purpose To evaluate 6‐month knowledge retention and long‐term satisfaction after two pedagogical escape games (PEGs) addressing foundational (3D printing) and clinical (pediatric dentistry) content in a dental curriculum. Methods In this monocentric serial cross‐sectional study, immediate post‑PEG knowledge was assessed in fifth‑year dental ...
Lina Grich +8 more
wiley +1 more source
In computer systems, user authentication technology is required to identify users who use computers. In modern times, various user authentication technologies, including strong security features based on ownership, such as certificates and security cards,
Jaehyuk Lee, Wonbin Jeong, Kyungroul Lee
doaj +1 more source
Perceived Educational Value of a Self‐Developed 3D‐Printed Pediatric Dentistry Simulator
ABSTRACT Purpose To design and assess a 3D‐printed pediatric dentistry simulator and to evaluate its perceived educational value and realism through student and expert feedback. Methods A maxillary simulator that is mountable on phantom heads was developed and produced by desktop stereolithography with single‐use inserts, enabling proximal caries ...
Michel Benyamin +11 more
wiley +1 more source
Technology Corner: Brute Force Password Generation -- Basic Iterative and Recursive Algorithms
Most information systems are secured at minimum by some form of password protection. For various reasons a password may be unavailable, requiring some form of password recovery procedure.
Nick Flor, Haile Shannon
doaj

