Network authentication with time expired scheme and random generated password / Muhamad Syuhaimi Baharuddin
The project was implemented in order to reduce the problems of user's that forget the password. Basically, a lot of user uses their personal informations as the password. It increases the risk of the password to be captured through password guessing attacks or brute-force attack. So, to redu...
| Main Author: | Baharuddin, Muhamad Syuhaimi |
|---|---|
| Format: | Thesis |
| Published: |
2004
|
| Online Access: | https://ir.uitm.edu.my/id/eprint/1698/ |
Similar Items
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019)
by: Seow, Yang Jiin
Published: (2019)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Second Level Password Generator
by: Tay, Choo Chuan, et al.
Published: (2010)
by: Tay, Choo Chuan, et al.
Published: (2010)
Enhanced password-based authentication protocol / Lee Chee Kiam.
by: Lee, Chee Kiam
Published: (2000)
by: Lee, Chee Kiam
Published: (2000)
DNA approach for password conversion generator
by: Chng, Chern Wei
Published: (2014)
by: Chng, Chern Wei
Published: (2014)
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010)
by: Wang, Liming, et al.
Published: (2010)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
Amin Aiskrim / Badrul Amin Baharuddin
by: Badrul Amin, Baharuddin
Published: (2020)
by: Badrul Amin, Baharuddin
Published: (2020)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002)
by: Mohd Shahman , Samsul Ambia
Published: (2002)
The impacts of inflation on developing countries / Nurul Adira Baharuddin
by: Baharuddin, Nurul Adira
Published: (2020)
by: Baharuddin, Nurul Adira
Published: (2020)
Artificial Neural Network (ANN) approach in predicting arsenic and mercury species in Kinta River / Norshidah Baharuddin
by: Baharuddin, Norshidah
Published: (2015)
by: Baharuddin, Norshidah
Published: (2015)
Characteristic airflow patterns during inspiration and expiration: experimental and numerical investigation
by: Zubair, Mohammed, et al.
Published: (2015)
by: Zubair, Mohammed, et al.
Published: (2015)
Disposal practices of unused and expired pharmaceuticals among general public in Kabul
by: Bashaar, Mohammad, et al.
Published: (2017)
by: Bashaar, Mohammad, et al.
Published: (2017)
The impact of economical factors on economic growth in Malaysia / Norshahira Baharuddin
by: Baharuddin, Norshahira
Published: (2018)
by: Baharuddin, Norshahira
Published: (2018)
Development of UiTM e-Rental application / Norshakila Baharuddin
by: Baharuddin, Norshakila
Published: (2006)
by: Baharuddin, Norshakila
Published: (2006)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
Unintended consequences of people’s housing programme / Baharuddin Mat Asek
by: Mat Asek, Baharuddin
Published: (2010)
by: Mat Asek, Baharuddin
Published: (2010)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
Duties of a banker towards his customers / Shamsul Bahrin Baharuddin
by: Baharuddin, Shamsul Bahrin
Published: (1982)
by: Baharuddin, Shamsul Bahrin
Published: (1982)
Post occupancy evaluation (POE) on green building / Muhammad Nurfaiz Baharuddin
by: Baharuddin, Muhammad Nurfaiz
Published: (2015)
by: Baharuddin, Muhammad Nurfaiz
Published: (2015)
A source authentication and data confidentiality scheme for multicast networks
by: Benmachiche, Abderrahim, et al.
Published: (2016)
by: Benmachiche, Abderrahim, et al.
Published: (2016)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Password practices of Swedish websites
by: Lim, Nena, et al.
Published: (2010)
by: Lim, Nena, et al.
Published: (2010)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Similar Items
-
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008) -
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023) -
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008) -
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014) -
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)