Search

Your search keyword '"Password policy"' showing total 1,597 results

Search Constraints

Start Over You searched for: Descriptor "Password policy" Remove constraint Descriptor: "Password policy"
1,597 results on '"Password policy"'

Search Results

251. Sweet-spotting security and usability for intelligent graphical authentication mechanisms

252. So Much Promise, So Little Use: What is Stopping Home End-Users from Using Password Manager Applications?

253. Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment

254. Password Correction and Confidential Information Access System

255. GPASS: A Password Manager with Group-Based Access Control

256. Certified Password Quality

257. Case study on password complexity enhancement for smart devices

258. Safe user authentication in a network environment

259. Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol

260. Toward a secure and usable cloud-based password manager for web browsers

261. Multifactor Authentication Using a QR Code and a One-Time Password

262. Lightweight secure storage model with fault-tolerance in cloud environment

263. A provably secure smart card-based authenticated group key exchange protocol

264. An Improved Scheme of One-Time Password Identity Authentication Based on the S/KEY System

265. Design and Implementation of OTP Base on MD5

267. PASSWORD PROTECTION: END USER SECURITY BEHAVIOR

268. A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis

269. An efficient client–client password-based authentication scheme with provable security

270. Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps

271. GRID-IMAGE PASSWORD BASED SCHEME: ENHANCING MEMORABILITY FEATURES OF PASSWORDS

272. Honey Encryption: Encryption beyond the Brute-Force Barrier

273. Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems

274. A Robust and Efficient Password Authentication Scheme Using Smart Cards

275. Application of Password Services in an SMS Platform in Medical Record Copying

276. An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing

277. Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft

278. Two-factor face authentication using matrix permutation transformation and a user password

279. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems

280. A New Graphical Password Scheme Based on Universal Design

281. Research on Network Security and Identity Authentication

282. Research on the Network Security and Identity Authentication Technology

283. A User Identification Technique to Access Big Data using Cloud Services

284. M-Pass: Web Authentication Protocol Resistant to Malware and Phishing

285. Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements

286. Securing Web Accounts Using Graphical Password Authentication through Watermarking

287. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics

288. Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks

289. Securing ATM Using Graphical Password Authentication Scheme

291. Investigating the Viability of Multifactor Graphical Passwords for User Authentication

292. Authentication Systems for Securing Clinical Documentation Workflows

293. Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA

294. Secured Password Technique Using Devices

295. Authentication Scheme for Session Password using matrix Colour and Text

296. Secure password authentication schemes and their applications

297. Cryptanalysis of an Improved Smartcard-based Remote Password Authentication Scheme

298. Implementing 3D Graphical Password Schemes

299. Online Password Guessing Attacks by Using Persuasive Click Point with Dynamic User Block

300. Passwordless Authentication in Mobile e-health using a Secure Boot Non-regenerated Unique Identity and NFC

Catalog

Books, media, physical & digital resources