Moving Towards Two Dimensional Passwords
The main objective of the research is to specify two dimensional passwords that can possess much more strength as compared to linear passwords. These passwords are strong enough to provide effective and secure authentication under certain alarming situations. The alarming situations are the situatio...
| Main Authors: | Safdar, S., Hassan, M.F. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/3148/ http://scholars.utp.edu.my/id/eprint/3148/1/stamp.jsp%3Ftp%3D%26arnumber%3D5561566%26tag%3D1 |
Similar Items
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010)
by: Qureshi, MA., et al.
Published: (2010)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Improvements Over Two Phase Shortest Path Algorithm
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management
by: Akbar, R., et al.
Published: (2010)
by: Akbar, R., et al.
Published: (2010)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
A Survey on Different Interoperability Frameworks of SOA Systems Towards Seamless Interoperability
by: M. Ibrahim, N., et al.
Published: (2010)
by: M. Ibrahim, N., et al.
Published: (2010)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Theoretical Framework of the Effect of Extrinsic Rewards on Individual’s Attitude Towards Knowledge Sharing and the Role of Intrinsic Attributes
by: Amin, A., et al.
Published: (2009)
by: Amin, A., et al.
Published: (2009)
Coordinated Constraint Relaxation Using a
Distributed Agent Protocol
by: Hassan, M.F.
Published: (2007)
by: Hassan, M.F.
Published: (2007)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
Single and Replicated Simulations for Colored Petri Nets Nondeterministic Network
by: Adhipta, D., et al.
Published: (2010)
by: Adhipta, D., et al.
Published: (2010)
A Collaborative-Interaction Model of Software Project Development: An Extension to Agile Based Methodologies
by: Akbar, R., et al.
Published: (2010)
by: Akbar, R., et al.
Published: (2010)
Agent based Monitoring Framework for SOA Applications Quality
by: Balfagih, Z., et al.
Published: (2010)
by: Balfagih, Z., et al.
Published: (2010)
Limitations and Measures in Outsourcing Projects to Geographically Distributed Offshore Teams
by: Akhbar, R., et al.
Published: (2010)
by: Akhbar, R., et al.
Published: (2010)
Constraint relaxation to reduce brittleness of distributed agent
protocols
by: Hassan, M.F., et al.
Published: (2004)
by: Hassan, M.F., et al.
Published: (2004)
Addressing the Brittleness of Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Constraint Relaxation Approach for Over-Constrained Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Quality model for web services from multi-stakeholders' perspective
by: Balfagih, Z., et al.
Published: (2009)
by: Balfagih, Z., et al.
Published: (2009)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
by: Zun Liang, Chuan, et al.
Published: (2023)
by: Zun Liang, Chuan, et al.
Published: (2023)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Development of Simulation Environment for Agent Interaction Protocol
by: Latif, N.A., et al.
Published: (2010)
by: Latif, N.A., et al.
Published: (2010)
Theoretical Framework of the Effect of Extrinsic Rewards and Individual's Intrinsic Attributes on Knowledge Sharing Behavior
by: Amin, A., et al.
Published: (2009)
by: Amin, A., et al.
Published: (2009)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
Rule-based Pattern Extractor and Named Entity Recognition: A Hybrid Approach
by: Sari, Y., et al.
Published: (2010)
by: Sari, Y., et al.
Published: (2010)
A Survey on Adaptive Qualitative Assessment and Dynamic Questions Generation Approaches
by: Rozali, D.S., et al.
Published: (2010)
by: Rozali, D.S., et al.
Published: (2010)
Addressing Constraint Failures in Agent Interaction Protocol
by: Hassan, M.F., et al.
Published: (2009)
by: Hassan, M.F., et al.
Published: (2009)
Similar Items
-
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010) -
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017) -
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010) -
Improvements Over Two Phase Shortest Path Algorithm
by: Qureshi, M.A., et al.
Published: (2010) -
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)