Multiple hashes of single key with passcode for multiple accounts
A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However, human memorability const...
| Main Authors: | Lee, Kok-wah, Ewe, Hong-tat |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
ZHEJIANG UNIV, EDITORIAL BOARD
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3028/ http://shdl.mmu.edu.my/3028/1/1053.pdf |
Similar Items
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Performance study of Byzantine Agreement Protocol with artificial neural network
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Parallel Geometric Hashing Algorithm For Protein Tertiary Structure.
by: Jaber, Khalid, et al.
Published: (2007)
by: Jaber, Khalid, et al.
Published: (2007)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006)
by: Khoo, , K, et al.
Published: (2006)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
Remarks on BioHash and its mathematical foundation
by: TEOH, A, et al.
Published: (2006)
by: TEOH, A, et al.
Published: (2006)
An Enhanced Flower Pollination Algorithm For Multiple Sequence Alignment
by: Hussein, Ahmad Moh’d Aziz Issa
Published: (2020)
by: Hussein, Ahmad Moh’d Aziz Issa
Published: (2020)
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
by: Jahani, Shahram, et al.
Published: (2014)
by: Jahani, Shahram, et al.
Published: (2014)
Zot-mk: A New Algorithm For Big Integer Multiplication
by: Jahani , Shahram
Published: (2009)
by: Jahani , Shahram
Published: (2009)
Subcarrier Multiple Access system using a single optical source to suppress Optical Beat Interference
by: Abdul-Rashid, H. A., et al.
Published: (2007)
by: Abdul-Rashid, H. A., et al.
Published: (2007)
Remarks on BioHashing based cancelable biometrics in verification system
by: JIN, A, et al.
Published: (2006)
by: JIN, A, et al.
Published: (2006)
Energy efficient routing for wireless sensor networks with grid topology
by: Goh, Hock Guan, et al.
Published: (2006)
by: Goh, Hock Guan, et al.
Published: (2006)
ZOT-MK: a new algorithm for big integer multiplication[QA75].
by: Jahani, Shahram
Published: (2009)
by: Jahani, Shahram
Published: (2009)
Implementation Of Mediator-Based Integration System For A Transparent Access To Multiple Biological Databases.
by: Husain, Wahidah, et al.
Published: (2007)
by: Husain, Wahidah, et al.
Published: (2007)
Anchor Point Approach For Initial
Population Of Bat Algorithm For
Protein Multiple Sequence Alignment
by: Boraik Ali, Aziz Nasser
Published: (2016)
by: Boraik Ali, Aziz Nasser
Published: (2016)
Filtered Distance Matrix For
Constructing High-Throughput
Multiple Sequence Alignment On
Protein Data
by: Mohammad Abu-Hashem, Muhannad Abdul-Qader
Published: (2015)
by: Mohammad Abu-Hashem, Muhannad Abdul-Qader
Published: (2015)
Deformable Boundary Initialization For Object Detection In
Natural Images Using, Multiple Scale Edges.
by: Foon, Dah Way, et al.
Published: (2006)
by: Foon, Dah Way, et al.
Published: (2006)
PERFORMANCE EVALUATION OF SINGLE-PATH AND MULTIPATH MANETS ROUTING PROTOCOLS FOR DENSE AND SPARSE TOPOLOGY
by: Mahdi, Mohammed A., et al.
Published: (2017)
by: Mahdi, Mohammed A., et al.
Published: (2017)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Weights Binary Decision Diagram (WBDD) and its application to Matrix Multiplication
by: Bhuvaneswari, T., et al.
Published: (2009)
by: Bhuvaneswari, T., et al.
Published: (2009)
Multiplication Gain and Excess Noise Factor in Double Heterojunction Avalanche Photodiodes
by: A. H., You, et al.
Published: (2008)
by: A. H., You, et al.
Published: (2008)
Multiple error detection and correction based on redundant residue number systems
by: Tor Goh, Vik, et al.
Published: (2008)
by: Tor Goh, Vik, et al.
Published: (2008)
Individual recognition based on human iris using fractal dimension approach
by: Lee, , PS, et al.
Published: (2004)
by: Lee, , PS, et al.
Published: (2004)
A hybrid entropy decomposition and support vector machine method for agricultural crop type classification
by: Tan, Chue Poh, et al.
Published: (2007)
by: Tan, Chue Poh, et al.
Published: (2007)
Ant algorithm for amplifier spontaneous emission (ASE)-aware routing
by: Chin, Tan Saw, et al.
Published: (2007)
by: Chin, Tan Saw, et al.
Published: (2007)
Ant Colony Optimization approaches to the degree-constrained minimum spanning tree problem
by: Bau, Yoon Teck, et al.
Published: (2008)
by: Bau, Yoon Teck, et al.
Published: (2008)
AN ENHANCED ANT COLONY OPTIMIZATION METAHEURISTIC FOR THE MINIMUM DOMINATING SET PROBLEM
by: Ho, Chin Kuan, et al.
Published: (2006)
by: Ho, Chin Kuan, et al.
Published: (2006)
A study of fresnel scattered fields for ellipsoidal, and elliptic-disk-shaped scatterers
by: Koay, Jun Yi, et al.
Published: (2008)
by: Koay, Jun Yi, et al.
Published: (2008)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization
by: Wai Kuan, Yip, et al.
Published: (2007)
by: Wai Kuan, Yip, et al.
Published: (2007)
Similar Items
-
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004) -
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006) -
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007) -
Performance study of Byzantine Agreement Protocol with artificial neural network
by: Lee, Kok-Wah, et al.
Published: (2007) -
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)