Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
Civilian cryptosystem applies Kerckhoffs law to have security dependency 100% on the password secrecy. This reflects the fact that key length and key space are very important to ensure enough entropy or randomness for securing a cryptosystem. For stronger password, passphrase is suggested Currently,...
| Main Authors: | Lee, Kok-wah, Ewe, Hong-tat |
|---|---|
| Format: | Article |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2144/ |
Similar Items
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
Performance study of Byzantine Agreement Protocol with artificial neural network
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Building A Specialised Multilingual Dictionary From General Monolingual Dictionaries.
by: Chuah, Choy Kim
Published: (2004)
by: Chuah, Choy Kim
Published: (2004)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
A Framework For Automatic Code Switching Speech Recognition With Multilingual Acoustic And Pronunciation Models Adaptation
by: Ahmed, Basem H. A.
Published: (2014)
by: Ahmed, Basem H. A.
Published: (2014)
Energy efficient routing for wireless sensor networks with grid topology
by: Goh, Hock Guan, et al.
Published: (2006)
by: Goh, Hock Guan, et al.
Published: (2006)
Ant Colony Optimization approaches to the degree-constrained minimum spanning tree problem
by: Bau, Yoon Teck, et al.
Published: (2008)
by: Bau, Yoon Teck, et al.
Published: (2008)
A hybrid entropy decomposition and support vector machine method for agricultural crop type classification
by: Tan, Chue Poh, et al.
Published: (2007)
by: Tan, Chue Poh, et al.
Published: (2007)
AN ENHANCED ANT COLONY OPTIMIZATION METAHEURISTIC FOR THE MINIMUM DOMINATING SET PROBLEM
by: Ho, Chin Kuan, et al.
Published: (2006)
by: Ho, Chin Kuan, et al.
Published: (2006)
Ant algorithm for amplifier spontaneous emission (ASE)-aware routing
by: Chin, Tan Saw, et al.
Published: (2007)
by: Chin, Tan Saw, et al.
Published: (2007)
A study of fresnel scattered fields for ellipsoidal, and elliptic-disk-shaped scatterers
by: Koay, Jun Yi, et al.
Published: (2008)
by: Koay, Jun Yi, et al.
Published: (2008)
Simulation study of a heuristic near-maximum ant-based dynamic routing
by: Tan, Chin, et al.
Published: (2008)
by: Tan, Chin, et al.
Published: (2008)
Simulation study of a heuristic near-maximum ant-based dynamic routing
by: Tan, Chin, et al.
Published: (2008)
by: Tan, Chin, et al.
Published: (2008)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Performance of an ant colony optimization (ACO) algorithm on the dynamic load-balanced clustering problem in ad hoc networks
by: Ho, , CK, et al.
Published: (2005)
by: Ho, , CK, et al.
Published: (2005)
Individual recognition based on human iris using fractal dimension approach
by: Lee, , PS, et al.
Published: (2004)
by: Lee, , PS, et al.
Published: (2004)
Ant Colony Optimization Approaches for the Dynamic Load-Balanced Clustering Problem in Ad Hoc Networks
by: Ho, Chin K., et al.
Published: (2007)
by: Ho, Chin K., et al.
Published: (2007)
A hybrid ant colony optimization approach (hACO) for constructing load-balanced clusters
by: Ho, C. K., et al.
Published: (2005)
by: Ho, C. K., et al.
Published: (2005)
Unidirectional Lightweight Encapsulation With Header Compression For IP Based Satellite Communication Over DVB-S.
by: Wan, Tat-Chee
Published: (2007)
by: Wan, Tat-Chee
Published: (2007)
Cognitive Radio-Based Power Adjustment For Wi-Fi.
by: Tat, Chee Wan
Published: (2009)
by: Tat, Chee Wan
Published: (2009)
An ant colony optimization approach to the degree-constrained minimum spanning tree problem
by: Ewe, HT, et al.
Published: (2005)
by: Ewe, HT, et al.
Published: (2005)
The Notion Of Instrument In Malay Language.
by: Bali, Ranaivo-Malançon
Published: (2007)
by: Bali, Ranaivo-Malançon
Published: (2007)
Performance Evaluation Of Unidirectional Lightweight Encapsulation Using ns-2 And DVB-S Testbed.
by: Ang, Way-Chuang, et al.
Published: (2007)
by: Ang, Way-Chuang, et al.
Published: (2007)
High-level language and compiler for reconfigurable computing
by: Hiew,, FS, et al.
Published: (2004)
by: Hiew,, FS, et al.
Published: (2004)
CCS512 – LANGUAGE ENGINEERING NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)
by: Tat, Kin Tan, et al.
Published: (2007)
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
by: Natsheh, Essam, et al.
Published: (2008)
by: Natsheh, Essam, et al.
Published: (2008)
Adapting An Existing Example-Based Machine Translation (EBMT)
System For New Language Pairs Based On An Optimized Bilingual
Knowledge Bank (BKB).
by: Lim, Huan Ngee, et al.
Published: (2007)
by: Lim, Huan Ngee, et al.
Published: (2007)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
CPT315 - NATURAL LANGUAGE PROCESSING MAC 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CSC514 - NATURAL LANGUAGE PROCESSING - OKT. 2000
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
CSC514 - NATURAL LANGUAGE PROCESSING SEP 99.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
Similar Items
-
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007) -
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007) -
Performance study of Byzantine Agreement Protocol with artificial neural network
by: Lee, Kok-Wah, et al.
Published: (2007) -
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005) -
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)