152
click to vote
MCETECH
15 years 10 months ago
2009 Springer
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
117
Voted
MCETECH
15 years 10 months ago
2009 Springer
Access control rules are currently administered by highly qualified personnel. Thus, the technical barrier that specialized access control languages represent naturally prevents th...
|