Search

Your search keyword '"Password policy"' showing total 1,597 results

Search Constraints

Start Over You searched for: Descriptor "Password policy" Remove constraint Descriptor: "Password policy"
1,597 results on '"Password policy"'

Search Results

51. Computer misuse in the workplace.

52. Personal Information in Passwords and Its Security Implications

53. Security bound enhancement of remote user authentication using smart card

54. A Theoretical Framework for Password Security against Offline Guessability Attacks

55. EvoPass: Evolvable graphical password against shoulder-surfing attacks

56. Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords

57. Security Analysis of Password-Authenticated Key Retrieval

58. Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security

59. Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength

60. Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card

61. A novel secure and efficient hash function with extra padding against rainbow table attacks

62. Anonymous Password Authenticated Key Exchange Protocol in the Standard Model

63. BlindLogin: A Graphical Authentication System with Support for Blind and Visually Impaired users on Smartphones

64. A password authentication method for remote users based on smart card and biometrics

65. An evaluation of the Game Changer Password System: A new approach to password security

66. VAP code: A secure graphical password for smart devices

67. Must I, can I? I don’t understand your ambiguous password rules

68. Multi-Factor Authentication with OpenId in Virtualized Environments

69. Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones

70. A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme

71. A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps

72. Evaluating the effect of guidance and feedback upon password compliance

73. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

74. New Graphic Password Scheme Containing Questions-Background-Pattern and Implementation

75. Leveraging 3D Benefits for Authentication

76. A Secure and Practical Authentication Scheme Using Personal Devices

77. A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem

78. Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords

79. An image edge based approach for image password encryption

80. Performance analysis and evaluation of secure password persuasive cued click points

81. Through the looking glass: helping patrons manage passwords and protect their digital identities

82. Encouraging users to improve password security and memorability

83. Compromised user credentials detection in a digital enterprise using behavioral analytics

84. Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses

85. Where does the authorities passwordpolicys come from? : A qualtivative study about their origins

86. A Multi-Tier Security Analysis of Official Car Management Apps for Android

87. An Investigation of the Psychology of Password Replacement by Email Users

88. Leveraging autobiographical memory for two-factor online authentication

89. Graphical Passwords: Requisite for Secure Information Systems

90. Multilevel Authentication Scheme for Cloud Computing

91. Utilizing Keystroke Dynamics as an Additional Security Measure to Password Security in Computer Web-based Applications - A Case Study of UEW

92. What’s a Special Character Anyway? Effects of Ambiguous Terminology in Password Rules

93. An Exploration of Geographic Authentication Schemes

94. Password Entry Times for Recognition-based Graphical Passwords

95. A Case Study of Password Usage for Domestic Users

96. Enhancing Authentication Schemes for Multi-Level Graphical Password in Cloud Environment

97. User practice in password security: An empirical study of real-life passwords in the wild

98. Password Security: An Analysis of Password Strengths and Vulnerabilities

99. Dual Layer Secured Password Manager using Blowfish and LSB

100. IMPROVING DATA ACCESS SECURITY BY SERVER-SIDE FUNCTIONAL EXTENSIONS

Catalog

Books, media, physical & digital resources