Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Viktor Taneski"'
Publikováno v:
Applied Sciences, Vol 14, Iss 10, p 4115 (2024)
Recent advancements in Large Language Models (LLMs) like ChatGPT and Copilot have led to their integration into various educational domains, including software development education. Regular use of LLMs in the learning process is still not well-resea
Externí odkaz:
https://doaj.org/article/6845014a0ffa4b10aaedbb517f776b9e
Publikováno v:
Applied Sciences, Vol 11, Iss 20, p 9406 (2021)
Recent literature proposes the use of a proactive password checker as method for preventing users from creating easy-to-guess passwords. Markov models can help us create a more effective password checker that would be able to check the probability of
Externí odkaz:
https://doaj.org/article/0316e38ff5c74a00ac88a19e365ee460
Autor:
Leon Bošnjak, Viktor Taneski
Publikováno v:
Uporabna informatika. 30
Besedilna gesla so dandanes še vedno najbolj pogost mehanizem avtentikacije, predvsem zaradi enostavne uporabe in implementacije, ter lažje pomljivosti. Kljub številnim prednostim pa so s postopnim povečanjem procesorske moči računalnikov posta
Publikováno v:
Applied Sciences, Vol 11, Iss 9406, p 9406 (2021)
Applied Sciences
Volume 11
Issue 20
Applied Sciences
Volume 11
Issue 20
Recent literature proposes the use of a proactive password checker as method for preventing users from creating easy-to-guess passwords. Markov models can help us create a more effective password checker that would be able to check the probability of
Publikováno v:
OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019.
Autor:
Viktor Taneski
Publikováno v:
Sodobne informacijske tehnologije in storitve.
Publikováno v:
MIPRO
Measuring strength of passwords is important in order to ensure the security of password-based authentication. Since passwords are still the most widely used method for authentication, there has been a considerable research on passwords and password
Autor:
Boštjan Brumen, Viktor Taneski
Publikováno v:
MIPRO
Background: Passwords are still the predominant way of authentication in information systems, and are mostly at user's responsibility. They conceive, use, re-use, abuse and forget passwords. In absence of strict password policies and at minimum requi
Publikováno v:
MIPRO
Textual passwords were first identified as a weak point in information system's security by Morris and Thompson in 1979. They found that 86% of the passwords were weak: being too short, containing lowercase letters only, digits only or a combination