PASSWORDS

作品数:11被引量:3H指数:1
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:冯登国更多>>
相关机构:北京信息科技大学清华同方|同方股份有限公司吉大正元信息技术股份有限公司联想(北京)有限公司更多>>
相关期刊:《计算机应用文摘》《Journal of Information Security》《China Communications》《Journal of Computer Science & Technology》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Performance evaluation of Cuckoo filters as an enhancement tool for password cracking
《Cybersecurity》2024年第4期62-72,共11页Maria-Dolores Cano Antonio Vilfranca Igor Tasic 
supported by the research Grant PID2020-116329 GB-C22 funded by MCIN/AEI/10.13039/501100011033.
Cyberthreats continue their expansion,becoming more and more complex and varied.However,credentials and passwords are still a critical point in security.Password cracking can be a powerful tool to fight against cyber ...
关键词:Authentication PASSWORDS Password cracking CYBERSECURITY Cuckoo filters 
AvoidPwd: A Mnemonic Password Generation Strategy Based on Keyboard Transformation被引量:1
《China Communications》2022年第10期92-101,共10页Shunying Lyu Qian Yao Jianhua Song 
supported in part by the National Natural Science Foundation of China (No. 61803149 and No. 61977021);in part by the Technology Innovation Special Program of Hubei Province (No. 2020AEA008);in part by the Hubei Province Project of Key Research Institute of Humanities and Social Sciences at Universities (Research Center of Information Management for Performance Evaluation)
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ...
关键词:password generation strategy password security mnemonic passwords 
Cyber Security Awareness among Students and Faculty Members in a Sudanese College被引量:1
《Electrical Science & Engineering》2020年第2期24-28,共5页Mohammed Daffalla Elradi Altigani Abd alraheem Altigani Osman Idriss Abaker 
In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of b...
关键词:Cyber security AWARENESS PASSWORDS STUDENTS Faculty members 
Secure Passwords Using Combinatorial Group Theory
《Journal of Information Security》2018年第2期154-167,共14页Gilbert Baumslag Benjamin Fine Anja Moldenhauer Gerhard Rosenberger 
Password security is a crucial component of modern internet security. In this paper, we present a provably secure method for password verification using combinatorial group theory. This method relies on the group rand...
关键词:PASSWORD SECURITY Combinatorial GROUP Theory Free GROUP CRYPTOGRAPHY GROUP Randomizer System 
Google is Trying to Stop You Having to Put in Passwords
《高中生之友(高考版)》2017年第1期87-89,共3页王巧云 
谷歌已经开始了无需密码即可登录应用程序的战争——开源系统Yolo,Yolo是"You Only Login Once"(你只需登录一次)的缩写。该系统允许用户通过使用密码管理器,迅速而安全地进入手机应用程序。使用该系统,用户只需要登录到他们的密码...
关键词:中等教育 英语 阅读 理解 
Passwords Management via Split-Key
《Journal of Information Security》2016年第3期206-214,共9页Kenneth Giuliani V. Kumar Murty Guangwu Xu 
This paper proposes a scheme for password management by storing password encryptions on a server. The method involves having the encryption key split into a share for the user and one for the server. The user’s share...
关键词:Password Encryption Password Storage Identity Management Secret Sharing 
Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords
《Chinese Physics B》2015年第11期163-170,共8页谢琪 胡斌 陈克非 刘文浩 谭肖 
supported by the Natural Science Foundation of Zhejiang Province,China(Grant No.LZ12F02005);the Major State Basic Research Development Program of China(Grant No.2013CB834205);the National Natural Science Foundation of China(Grant No.61070153)
In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, su...
关键词:CHAOS Chebyshev chaotic maps ANONYMOUS authenticated key exchange 
Making a Higher Hit Ratio Cryptanalytic Time-Memory Trade-Off Attack on Passwords被引量:1
《Chinese Journal of Electronics》2013年第4期671-676,共6页ZOU JingI LIN Dongdai HAO Chunhui LI Zhenqi WANG Wenhao LU Yao 
This work is supported by the National Basic Research Program of China (973 Program) (No.2011CBC302400), the National Natural Science Foundation of China (No.60970152), and the Young Teacher's Fund Project of Huaiyin Normal University (No.07HSQN020).
Most of implementations of the cryptana- lyric time-memory trade-off attacks such as Hellman's orig- inal method, Rivest's distinguished points cracking and Oechslin's rainbow attack are also considered as an ex- h...
关键词:Time-memory trade-off CRYPTANALYSIS High hit ratio. 
nPAKE^+:A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords
《Journal of Computer Science & Technology》2009年第1期138-151,共14页万志国 邓慧杰 鲍丰 Bart Preneel 顾明 
supported in part by the Concerted Research Action(GOA)Ambiorics 2005/11 of the Flemish Government and by the IAP Programme P6/26 BCRYPT of the Belgian State(Belgian Science Policy);Zhiguo Wan is supported in part by a research grant of the IBBT(Interdisciplinary institute for BroadBand Technology)of the Flemish Government.
Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based grou...
关键词:security protocol password-authenticated key exchange group key agreement 
Practical Encrypted Key Agreement Using Passwords
《Wuhan University Journal of Natural Sciences》2006年第6期1625-1628,共4页WU Shuhua ZHU Yuefei 
Supported by the National Natural Science Foun-dation of China (60473021)
We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does no...
关键词:PASSWORD encrypted key exchange Diffie-Hellman assumptions 
检索报告 对象比较 聚类工具 使用帮助 返回顶部