Fundamental to password based security
| Main Authors: | Hameed, Shihab A., Zainazlan, Ahmed Fathi, Nor Rahim, Herman Sazwan |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21438/ http://irep.iium.edu.my/21438/1/Chapter_31.pdf |
Similar Items
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019)
by: Seow, Yang Jiin
Published: (2019)
Computers and electronic devices waste: fundamental facts
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
Fundamental to medical data centers
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Second Level Password Generator
by: Tay, Choo Chuan, et al.
Published: (2010)
by: Tay, Choo Chuan, et al.
Published: (2010)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Combinatoric Drag–Pattern-Graphical-Password (DPGP)
by: Sylla, Mohamed, et al.
Published: (2013)
by: Sylla, Mohamed, et al.
Published: (2013)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
Wireless technology to secure emergency and guidance
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Password practices of Swedish websites
by: Lim, Nena, et al.
Published: (2010)
by: Lim, Nena, et al.
Published: (2010)
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
DNA approach for password conversion generator
by: Chng, Chern Wei
Published: (2014)
by: Chng, Chern Wei
Published: (2014)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Enhanced password-based authentication protocol / Lee Chee Kiam.
by: Lee, Chee Kiam
Published: (2000)
by: Lee, Chee Kiam
Published: (2000)
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
by: Cheong, S., et al.
Published: (2014)
by: Cheong, S., et al.
Published: (2014)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
On the use of image and emojis in graphical password application
by: Zabidi, Nur Syabila, et al.
Published: (2019)
by: Zabidi, Nur Syabila, et al.
Published: (2019)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002)
by: Mohd Shahman , Samsul Ambia
Published: (2002)
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
Improvement vehicle starting system through user password
by: Mohd Afize Syafri, Mohd Ajwi
Published: (2009)
by: Mohd Afize Syafri, Mohd Ajwi
Published: (2009)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010)
by: Wang, Liming, et al.
Published: (2010)
The effect of baroque music on the PassPoints graphical password
by: Gao, Haichang, et al.
Published: (2010)
by: Gao, Haichang, et al.
Published: (2010)
Fundamentals of multimedia
by: Zeki, Akram M., et al.
Published: (2015)
by: Zeki, Akram M., et al.
Published: (2015)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Fundamentals of microelectronic circuits
by: Motakabber, S. M. A., et al.
Published: (2012)
by: Motakabber, S. M. A., et al.
Published: (2012)
Similar Items
-
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011) -
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019) -
Computers and electronic devices waste: fundamental facts
by: Hameed, Shihab A.
Published: (2011) -
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014) -
Fundamental to medical data centers
by: Hameed, Shihab A., et al.
Published: (2011)