军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 passwords相关记录16条 . 查询时间(0.062 秒)
Password managers (aka stores or vaults) allow a user to store and retrieve (usually high-entropy) passwords for her multiple password-protected services by interacting with a "device" serving the rol...
In 2011 Stajano proposed Pico, a secure and easy-to-use alternative for passwords. Among the many proposals in this category, Pico stands out by being creative and convincing. However, the descripti...
Despite more than thirty years of intensive research efforts, textual passwords are still enveloped in mysterious veils. In this work, we make a substantial step forward in understanding the underlyi...
We introduce quantitative usability and security models to guide the design of password management schemes — systematic strategies to help users create and remember multiple passwords. In the same ...
Trying to make it more difficult to hack passwords has a long history. However the research community has not addressed the change of context from traditional Unix mainframe systems to web application...
Passwords—secret combinations of symbols—play an important role in physical world security (e.g. watchword to prevent unauthorized entry into military forbidden area) from ancient times. With emerge...
Using Hamiltonian Totems as Passwords     Token  3D  Hamiltonian       2014/3/6
Physical authentication brings extra security to software authentication by adding real-world input to conventional authentication protocols. Existing solutions such as textual and graphical passwords...
The sounds resulting from keyboard typing can reveal information about the input data. In this paper, we revisit such keyboard acoustic emanations for the purpose of eavesdropping over “strong” (rando...
In click-based graphical password schemes that allow arbitrary click locations on image, a click should be verified as correct if it is close within a predefined distance to the originally chosen lo...
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password, and there is no additional setup assumption in the network. Our protocol ...
Recently, Sun, Chen and Hwang [J. Syst. Software, 75 (2005), 63{68] have proposed two new three-party protocols, one for password-based authenticated key agreement and one for verifier-based authent...
Password-authenticated key exchange (PAKE) allows two or multiple parties to share a session key using a human-memorable password only. PAKE has been applied in various environments, especially in the...
We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable)...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...