An Analysis on Vulnerabilities of Password Retrying
Recently, due to security concerns, most of the computing systems have employed authentication based access control mechanisms. Again, in general, a considerable number of such systems we use in our day-to-day life. Hence, we also have to memorize a considerably large number of passwords, which incu...
| Main Authors: | Ranak, M. S. A. Noman, Azad, Saiful, Safwan Fathi, Mohammad, Kamal Z., Zamli, Rahman, Mohammed Mostafizur |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publisher
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19609/ http://umpir.ump.edu.my/id/eprint/19609/1/An%20Analysis%20on%20Vulnerabilities%20of%20Password%20Retrying.pdf |
Similar Items
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
TeKET: a tree-based unsupervised keyphrase extraction technique
by: Rabby, Gollam, et al.
Published: (2020)
by: Rabby, Gollam, et al.
Published: (2020)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
A flexible keyphrase extraction technique for academic literature
by: Gollam, Rabby, et al.
Published: (2018)
by: Gollam, Rabby, et al.
Published: (2018)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
A Highly Accurate PDF-To-Text Conversion System for Academic Papers Using Natural Language Processing Approach
by: Yong, Tien Fui, et al.
Published: (2018)
by: Yong, Tien Fui, et al.
Published: (2018)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021)
by: Hazim, Hanif, et al.
Published: (2021)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Comparative analysis of machine learning models to predict common vulnerabilities and exposure
by: Shaesta Khan, Sheh Rahman, et al.
Published: (2024)
by: Shaesta Khan, Sheh Rahman, et al.
Published: (2024)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Comparison of document similarity algorithms in extracting document keywords from an academic paper
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Vulnerability Detection System (Xposed)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Test Data Generation for Event Driven System Using Bees Algorithm
by: Mohammed Zabil, Mohd H., et al.
Published: (2013)
by: Mohammed Zabil, Mohd H., et al.
Published: (2013)
Self-adaptive Population Size Strategy Based on Flower Pollination Algorithm for T-Way
Test Suite Generation
by: Abdullah, Nasser, et al.
Published: (2019)
by: Abdullah, Nasser, et al.
Published: (2019)
Fuzzy adaptive teaching learning-based optimization strategy for pairwise testing
by: Din, Fakhrud, et al.
Published: (2017)
by: Din, Fakhrud, et al.
Published: (2017)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
A Chaotic Teaching Learning Based Optimization Algorithm for Optimization Emergency Flood Evacuation Routing
by: Kamal Z., Zamli
Published: (2016)
by: Kamal Z., Zamli
Published: (2016)
Anywhere On-Keyboard Password technique
by: Abdul Ameer, Dalia Abdul Hadi, et al.
Published: (2010)
by: Abdul Ameer, Dalia Abdul Hadi, et al.
Published: (2010)
Hyper-heuristic based strategy for pairwise test case generation
by: Fakhrud, Din, et al.
Published: (2018)
by: Fakhrud, Din, et al.
Published: (2018)
T-Way Testing Strategies: Issues, Challenges, and Practices
by: Kamal Z., Zamli, et al.
Published: (2014)
by: Kamal Z., Zamli, et al.
Published: (2014)
TBat: A Novel Strategy for Minimization of T-Way Interaction
Test Suite Based on the Particle Swarm Optimization and the
Bat Algorithm
by: Kamal Z., Zamli, et al.
Published: (2016)
by: Kamal Z., Zamli, et al.
Published: (2016)
Adopting Jaya Algorithm for Team Formation Problem
by: Kader, Md. Abdul, et al.
Published: (2020)
by: Kader, Md. Abdul, et al.
Published: (2020)
Similar Items
-
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016) -
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017) -
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018) -
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017) -
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)