1-18 of 18
Keywords: password
Sort by
Journal Article
Ji Sun Shin and others
The Computer Journal, Volume 64, Issue 8, August 2021, Pages 1293–1302, https://doi.org/10.1093/comjnl/bxaa178
Published: 05 January 2021
... users using the PW are impersonated. In particular, the exposure of passwords by server compromise represents a serious threat. Typically, in a client/server model, a large number of clients are registered, and their PWs are processed and stored on the server. When the server is compromised and the PWs...
Journal Article
Valentina Costantino and others
Journal of Travel Medicine, Volume 27, Issue 5, July 2020, taaa081, https://doi.org/10.1093/jtm/taaa081
Published: 22 May 2020
... bans as a control measure for the COVID-19 epidemic. Pandemic outbreak response non-pharmaceutical interventions modelling boarder closure epidemic control coronavirus SARS-CoV-2 travel restrictions border quarantine immunity password In response to the epidemic of COVID-19, 1...
Journal Article
Yee-Yin Choong and others
Journal of Cybersecurity, Volume 5, Issue 1, 2019, tyz015, https://doi.org/10.1093/cybsec/tyz015
Published: 13 December 2019
... use? Where do you use computers? About how much time do you spend on computers each day during the week? About how much time do you spend on computers during the weekend? What do you do when you go on the computer? (list of activities) RQ1 Assess students’ use of passwords...
Journal Article
Dario Fiore and others
The Computer Journal, Volume 60, Issue 12, December 2017, Pages 1912–1922, https://doi.org/10.1093/comjnl/bxx078
Published: 21 September 2017
... is supposed to reflect passive eavesdropping. In particular, no password online-guess can be implemented with this oracle. 𝖱𝖾𝗏𝖾𝖺𝗅 ( U i , j ) . Yields the session key 𝗌𝗄 i j (if this has been defined). 𝖳𝖾𝗌𝗍 ( U i , j ) . Only one query...
Journal Article
Hung-Yu Chien
The Computer Journal, Volume 59, Issue 4, April 2016, Pages 592–601, https://doi.org/10.1093/comjnl/bxv094
Published: 02 November 2015
... authentication password Authenticated key agreement is essential to many information systems as it simultaneously provides the authentications of the communicating parties and the establishment of secure session keys, which would be used to secure the following transmissions. Owing to its Non-Polynomial (NP...
Journal Article
Lanfranco Lopriore
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2557–2566, https://doi.org/10.1093/comjnl/bxu125
Published: 09 November 2014
... a nominal access privilege for this object corresponds to an effective, possibly weaker access privilege, or is revoked. We associate a password system with each object; the password system takes the form of a hierarchical bidimensional one-way chain. A subject possesses a nominal access privilege...
Journal Article
Lanfranco Lopriore
The Computer Journal, Volume 58, Issue 4, April 2015, Pages 782–791, https://doi.org/10.1093/comjnl/bxt131
Published: 11 November 2013
... system consisting of nodes connected by a local area network, we present a new formulation of the password capability paradigm that takes advantage of techniques of symmetric-key cryptography to represent password capabilities in memory. We assign a cryptographic key to each application; the password...
Journal Article
Yu-Fang Chung and Zhen-Yu Wu
The Computer Journal, Volume 55, Issue 10, October 2012, Pages 1169–1179, https://doi.org/10.1093/comjnl/bxs003
Published: 05 February 2012
... able to achieve effective protection due to their overtly simple protection method, or others that emphasize on theories have been difficult to put into practice due to the complicated protection method devised. In this study, we propose an efficient and secure e-voting scheme that employs the password...
Journal Article
Beate Grawemeyer and Hilary Johnson
Interacting with Computers, Volume 23, Issue 3, May 2011, Pages 256–267, https://doi.org/10.1016/j.intcom.2011.03.007
Published: 13 April 2011
...Beate Grawemeyer; Hilary Johnson Lax security behaviour and relaxed use of the Internet is typified by users creating passwords with the primary function of enabling easy retrieval from memory, rather than with security as a priority. Investigations of password memorability and security found...
Journal Article
Maurice D. Castro and others
The Computer Journal, Volume 51, Issue 5, September 2008, Pages 595–607, https://doi.org/10.1093/comjnl/bxm124
Published: 09 February 2008
... 2008 Abstract The Walnut kernel is a capability-based operating system kernel that was developed in the Department of Computer Science at Monash University during the 1990s. This kernel is heir to many of the ideas that were implemented in the Password- Capability System. Focusing on the programmer's...
Journal Article
Doug Mahar and others
Interacting with Computers, Volume 10, Issue 4, November 1998, Pages 375–383, https://doi.org/10.1016/S0953-5438(98)00024-1
Published: 01 November 1998
... verification: toward an accurate, efficient, and ecologically valid algorithm, International Journal of Human-Computer Studies 43 (1995) 213-222) was assessed in a text-dependent setting. Twenty-nine subjects typed a 17 character password 50 times. False acceptance and false rejection rates were...
Chapter
Published: 21 February 2017
..., but there are also four necessary contributing speech acts required. When we join Twitter we are required to give Twitter a full name, an email address, a password and a user name. These component acts are all shown to be Status Function Declarations that cause deontic effects through Twitter’s acceptance of the act...
Book
Published online: 22 November 2018
Published in print: 20 November 2018
Chapter
Published: 01 March 2012
... generator Figure 8.1 Basic model of a deterministic generator Figure 8.2 One-way function for UNIX password protection Figure 8.3 Example of a dynamic password scheme based on challenge–response Figure 8.4 Popular analogy of a zero-knowledge mechanism This chapter explains how cryptography can...
Chapter
Published: 08 December 2021
... recommendations applicable to informed readers who may not be subject matter experts, and who wish to manage their personal cyber risks more effectively. personal hygiene awareness risk confidentiality integrity availability password antivirus privacy Cybersecurity is about protecting...
Chapter
Published: 21 August 2014
..., news may travel ‘by word of mouth’, a truthful person ‘keeps to their word’. word meaning password double duty ambiguity Words are mysterious and also magnificent creatures. They can fix laws, instruct, beseech, praise, and anger. There is a proverb: Sticks and stones may break my bones but words...
Chapter
Published: 28 September 2012
...This chapter is an attempt to formulate ideas about the operations performed by physiological mechanisms, and not merely a discussion of the physiological mechanisms of sensory pathways. It presents three hypotheses regarding the purpose of sensory relays. The first one is the “password” hypothesis...
Chapter
Published: 10 June 2022
... of these nefarious actors. Luckily, there are ways to stay safe, with vigilance and tools like password managers, antivirus software, multifactor authentication, encryption, burners, and even a bag of chips. Such tools not only increase a journalist’s personal security, but also help reporters gain the trust...