Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Security question"'
Autor:
Abhishek Madduri, Rehana Parveen, Maruthi Rohit Ayyagari, Haider Mehraj, Sulaima Lebbe Abdul Haleem, Dharmesh Dhabliya, D. Jayadevappa
Publikováno v:
Pattern Recognition Letters. 152:218-224
Nowadays, Passwords are to identify users of Social Networking Sites (SNS). However, there are some downsides to it such as the user forgetting their password or the account being hacked by an attacker. To retrieve their password, websites are asking
Publikováno v:
Academic Perspective Procedia. 3:385-394
Nowadays, the virtual world is widely used by increasing of the precautions for the global pandemic. Therefore, the membership systems that are created on the basis of the user accounts have an important role in order to meet the increasing requireme
Publikováno v:
2021 2nd Global Conference for Advancement in Technology (GCAT).
Authenticated e voting system (AEVS) is developed taking into consideration the security. The AEVS system is designed for the welfare of the nation to provide an opportunity to the residents who are outside the nation want to choose their representat
Publikováno v:
AFT
Bitcoin is a peer-to-peer electronic cash system invented by Nakamoto in 2008. While it has attracted much research interest, its exact latency and security properties remain open. Existing analyses provide security and latency (or confirmation time)
Autor:
Jazbec, Milan
Publikováno v:
The Sarmatian Review. XX(03):730-737
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=114259
Publikováno v:
Prevention Science. 21:194-202
Anonymous data collection systems are often necessary when assessing sensitive behaviors but can pose challenges to researchers seeking to link participants over time. To assist researchers in anonymously linking participants, we outlined and tested
Publikováno v:
Library Hi Tech News. 36:7-10
Purpose Information resources and services are considered tangible assets which are valuable in decision making. Information can fulfill this function only if it is delivered via effective marketing at the end users’ doorsteps. The evolution of ICT
Publikováno v:
ACM Transactions on Privacy and Security. 22:1-34
Passwords are widely used for user authentication, but they are often difficult for a user to recall, easily cracked by automated programs, and heavily reused. Security questions are also used for secondary authentication. They are more memorable tha
Autor:
Manu Lekunze
Publikováno v:
Inherent and Contemporary Challenges to African Security ISBN: 9783030269241
As indicated above, essential to any security study are the three questions, what is security, security for whom and what constitutes a security issue. In effect, this chapter uses existing literature to situate the understanding of security in the A
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0d09a50a4656fb947d7e579607db535c
https://doi.org/10.1007/978-3-030-26925-8_3
https://doi.org/10.1007/978-3-030-26925-8_3
Autor:
N. Jeyanthi, Rachit Bhalla
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030166564
ISDA (1)
ISDA (1)
Identifying and validating the user is a major concern in a heterogeneous network domain. Conventional algorithms and mechanisms could authenticate the users/messages, but with certain vulnerabilities. This paper analyzes the vulnerabilities and down
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1f8c9362e26d65550bf640b90afd8758
https://doi.org/10.1007/978-3-030-16657-1_42
https://doi.org/10.1007/978-3-030-16657-1_42