DNA approach for password conversion generator
The evolution of an information technology has been expended and growth rapidly since last decade, especially in the era of an internet web technology, such as, e-commence, ebusiness or e-payment or e-shopping and more. The evolution of an internet web technology has made the transmission of the dat...
| Main Author: | Chng, Chern Wei |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47687/ http://psasir.upm.edu.my/id/eprint/47687/1/DNA%20approach%20for%20password%20conversion%20generator.pdf |
Similar Items
Second Level Password Generator
by: Tay, Choo Chuan, et al.
Published: (2010)
by: Tay, Choo Chuan, et al.
Published: (2010)
Efficient dynamic DNA-based block cipher algorithm
by: Chng, Chern Wei
Published: (2023)
by: Chng, Chern Wei
Published: (2023)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Password practices of Swedish websites
by: Lim, Nena, et al.
Published: (2010)
by: Lim, Nena, et al.
Published: (2010)
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019)
by: Seow, Yang Jiin
Published: (2019)
Network authentication with time expired scheme and random generated password / Muhamad Syuhaimi Baharuddin
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Combinatoric Drag–Pattern-Graphical-Password (DPGP)
by: Sylla, Mohamed, et al.
Published: (2013)
by: Sylla, Mohamed, et al.
Published: (2013)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
On the use of image and emojis in graphical password application
by: Zabidi, Nur Syabila, et al.
Published: (2019)
by: Zabidi, Nur Syabila, et al.
Published: (2019)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Improvement vehicle starting system through user password
by: Mohd Afize Syafri, Mohd Ajwi
Published: (2009)
by: Mohd Afize Syafri, Mohd Ajwi
Published: (2009)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010)
by: Wang, Liming, et al.
Published: (2010)
The effect of baroque music on the PassPoints graphical password
by: Gao, Haichang, et al.
Published: (2010)
by: Gao, Haichang, et al.
Published: (2010)
New DNA based dynamical S-Box for block cipher
by: Chng, Chern Wei, et al.
Published: (2018)
by: Chng, Chern Wei, et al.
Published: (2018)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Enhanced password-based authentication protocol / Lee Chee Kiam.
by: Lee, Chee Kiam
Published: (2000)
by: Lee, Chee Kiam
Published: (2000)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Can background baroque music help to improve the memorability of graphical passwords?
by: Gao, Haichang, et al.
Published: (2010)
by: Gao, Haichang, et al.
Published: (2010)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
User practice of iStudent portal password policy / Normalina Ibrahim @ Mat Nor
by: Ibrahim @ Mat Nor, Normalina
Published: (2015)
by: Ibrahim @ Mat Nor, Normalina
Published: (2015)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Similar Items
-
Second Level Password Generator
by: Tay, Choo Chuan, et al.
Published: (2010) -
Efficient dynamic DNA-based block cipher algorithm
by: Chng, Chern Wei
Published: (2023) -
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006) -
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011) -
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)