Search

Your search keyword '"Password policy"' showing total 1,597 results

Search Constraints

Start Over You searched for: Descriptor "Password policy" Remove constraint Descriptor: "Password policy"
1,597 results on '"Password policy"'

Search Results

1. Delving Deep into Reverse Engineering of UEFI Firmwares via Human Interface Infrastructure.

2. Dynamically Generate Password Policy via Zipf Distribution.

3. Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses

4. Is My Password Strong Enough?: A Study on User Perception in The Developing World

5. PassMon: A Technique for Password Generation and Strength Estimation.

6. Is My Password Strong Enough?: A Study on User Perception in The Developing World.

8. Zero-Knowledge Password Policy Check from Lattices

9. Certified Password Quality : A Case Study Using Coq and Linux Pluggable Authentication Modules

11. Encouraging users to improve password security and memorability.

12. Human Generated Passwords – The Impacts of Password Requirements and Presentation Styles

13. Password Policy Languages: Usable Translation from the Informal to the Formal

14. A Cognitive-Behavioral Framework of User Password Management Lifecycle

15. Clear, Unambiguous Password Policies: An Oxymoron?

16. Securing password using dynamic password policy generator algorithm

17. IMPROVING DATA ACCESS SECURITY BY SERVER-SIDE FUNCTIONAL EXTENSIONS

18. Zipf’s law analysis on the leaked Iranian users’ passwords

20. Password Security Assessment of IoT-Devices

21. Password policy characteristics and keystroke biometric authentication

22. TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively

23. IMPROVING DATA ACCESS SECURITY BY SERVER-SIDE FUNCTIONAL EXTENSIONS.

24. Think Harder! Investigating the Effect of Password Strength on Cognitive Load during Password Creation

25. Better, Funner, Stronger: A Gameful Approach to Nudge People into Making Less Predictable Graphical Password Choices

26. Optiwords: A new password policy for creating memorable and strong passwords

27. Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications

28. Protecting Facebook Password: Indonesian Users’ Motivation

29. Evaluating Password Behavior at a Small University

30. SECURITY Comparison on KOREAN Password / Authentication Policy and Other Countries

31. ОСОБЛИВОСТІ ТЕХНІКО-ТЕХНОЛОГІЧНОГО МЕНЕДЖМЕНТУ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ ПІДПРИЄМСТВА В УМОВАХ БІЗНЕС-СЕРЕДОВИЩА

32. Nepoučitelní uživatelé: příčiny (ne)bezpečných hesel

33. Hybrid security assessment methodology for web applications

34. Provably secure verifier-based password authenticated key exchange based on lattices

35. One Time Password, from a Key Management Perspective

36. Password Policies vs. Usability: When Do Users Go 'Bananas'?

37. Hacking Passwords that Satisfy Common Password Policies

38. Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements

39. Giving Motivation for Using Secure Credentials through User Authentication by Game

40. Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT

41. Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites

42. A Shoulder Surfing Resistant Graphical Authentication System

43. DPPG: A Dynamic Password Policy Generation System

44. Biometric Encryption System for Increased Security

45. A variant of password authenticated key exchange protocol

46. A provably secure password-based anonymous authentication scheme for wireless body area networks

47. Real-Time Multimodal Biometric User Authentication for Web Application Access in Wireless LAN

48. A New Multimodal Approach for Password Strength Estimation—Part II: Experimental Evaluation

49. Someone in Your Contact List: Cued Recall-Based Textual Passwords

50. Var kommer myndigheters lösenordspolicys ifrån? : En kvalitativ studie om deras ursprung

Catalog

Books, media, physical & digital resources