Sciweavers

1242 search results - page 1 / 249
» Digital Objects as Passwords
Sort
View
USS
2008
13 years 7 months ago
Digital Objects as Passwords
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...
Mohammad Mannan, Paul C. van Oorschot
IJMMS
2007
103views more  IJMMS 2007»
13 years 4 months ago
Improving password security and memorability to protect personal and organizational information
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
JOC
2007
133views more  JOC 2007»
13 years 4 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
ICALT
2008
IEEE
13 years 11 months ago
LEMAT: A Project for Innovation in Teaching Mathematics
“Lemat” is an acronym for Libro Electrónico de Matemáticas, which means Electronic Book of Mathematics. It is a project developed by a group of teachers at secondary school ...
Beatriz Porras, Jose A. Cordon, Juan Manuel Olazab...
CSREASAM
2008
13 years 6 months ago
Design of an Automatic Password Protection Mechanism for Digital Documents
- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
Shashank Kaushik, Thomas Way