Buscar
Mostrando ítems 1-10 de 599
Graph coloring for enforcing password identification against brute force attacks
(Scopus, 2008)
Password Identification or Weak Authentication is one of the weakest points in accessing a system and a suitable point for recurrent attacks of crackers or sniffers. Breakdowns ranging from dictionary brute force attacks ...
Cryptanalysis of an efficient three-party password-based key exchange scheme
(WILEY-BLACKWELLHOBOKEN, 2012)
Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
La subjetividad mediática en clase
(Escuela de Comunicación Social. Facultad de Ciencia Política y Relaciones Internacionales. Universidad Nacional de Rosario. UNR Editora, 2012)