军事学 >>> 军事学 >>> 军事理论 军事史 军事心理学 战略学 战役学 战术学 军队指挥学 军制学 军队政治工作学 军事后勤学 军事地学 军事技术 军事学其他学科 军事学其他学科
搜索结果: 1-15 共查到军事学 Passwords相关记录16条 . 查询时间(0.039 秒)
SPHINX: A Password Store that Perfectly Hides Passwords from Itself     SPHINX  PAKE       font style='font-size:12px;'> 2018/7/20
Password managers (aka stores or vaults) allow a user to store and retrieve (usually high-entropy) passwords for her multiple password-protected services by interacting with a "device" serving the rol...
Realizing Pico: Finally No More Passwords!     implementation  public-key cryptography  authentication       font style='font-size:12px;'> 2016/1/8
In 2011 Stajano proposed Pico, a secure and easy-to-use alternative for passwords. Among the many proposals in this category, Pico stands out by being creative and convincing. However, the descripti...
Zipf’s Law in Passwords     User authentication  Password cracking  Statistics       font style='font-size:12px;'> 2016/1/8
Despite more than thirty years of intensive research efforts, textual passwords are still enveloped in mysterious veils. In this work, we make a substantial step forward in understanding the underlyi...
Naturally Rehearsing Passwords     Password Management Scheme  Security Model  Usability Model       font style='font-size:12px;'> 2016/1/3
We introduce quantitative usability and security models to guide the design of password management schemes — systematic strategies to help users create and remember multiple passwords. In the same ...
Method to Protect Passwords in Databases for Web Applications     authentication  passwords       font style='font-size:12px;'> 2015/12/31
Trying to make it more difficult to hack passwords has a long history. However the research community has not addressed the change of context from traditional Unix mainframe systems to web application...
Passwords—secret combinations of symbols—play an important role in physical world security (e.g. watchword to prevent unauthorized entry into military forbidden area) from ancient times. With emerge...
Using Hamiltonian Totems as Passwords     Token  3D  Hamiltonian       font style='font-size:12px;'> 2014/3/6
Physical authentication brings extra security to software authentication by adding real-world input to conventional authentication protocols. Existing solutions such as textual and graphical passwords...
The sounds resulting from keyboard typing can reveal information about the input data. In this paper, we revisit such keyboard acoustic emanations for the purpose of eavesdropping over “strong” (rando...
In click-based graphical password schemes that allow arbitrary click locations on image, a click should be verified as correct if it is close within a predefined distance to the originally chosen lo...
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password, and there is no additional setup assumption in the network. Our protocol ...
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords.
Recently, Sun, Chen and Hwang [J. Syst. Software, 75 (2005), 63{68] have proposed two new three-party protocols, one for password-based authenticated key agreement and one for verifier-based authent...
Simpler Session-Key Generation from Short Random Passwords.
Password-authenticated key exchange (PAKE) allows two or multiple parties to share a session key using a human-memorable password only. PAKE has been applied in various environments, especially in the...
Key Exchange Using Passwords and Long Keys     Key Exchange  Password  Long Keys       font style='font-size:12px;'> 2008/10/29
We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable)...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...