Second Level Password Generator
Password gives user access to the university computing services. Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. The intruder with the necessary knowledge, experience, and tools gains entry to a system, he or she may be able to monitor othe...
| Main Authors: | Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/4640/ http://eprints.utem.edu.my/id/eprint/4640/1/Proceedings_of_ICMNS_2010.pdf |
Similar Items
Solution Manual of Engineering Mathematics (module 5)
by: Tay, Choo Chuan, et al.
Published: (2008)
by: Tay, Choo Chuan, et al.
Published: (2008)
Integrated Features by Administering the Support Vector Machine of Translational Initiations Sites in Alternative Polymorphic Context
by: Nanna Suryana, Herman, et al.
Published: (2012)
by: Nanna Suryana, Herman, et al.
Published: (2012)
Transformation of Neill Mapping Function For GPS Tropospheric Delay
by: Hamzah , Sakidin, et al.
Published: (2012)
by: Hamzah , Sakidin, et al.
Published: (2012)
Solution Manual of Elementary Mathematics (module 8)
by: Tay, Choo Chuan, et al.
Published: (2008)
by: Tay, Choo Chuan, et al.
Published: (2008)
Practical database design for industrial maintenance system
by: Hasan Basari, Abd Samad, et al.
Published: (2010)
by: Hasan Basari, Abd Samad, et al.
Published: (2010)
Review On Statistics (Second Published)
by: Tay, Choo Chuan, et al.
Published: (2011)
by: Tay, Choo Chuan, et al.
Published: (2011)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
DNA approach for password conversion generator
by: Chng, Chern Wei
Published: (2014)
by: Chng, Chern Wei
Published: (2014)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Introduction to linear Algebra
by: Tay , Choo Chuan, et al.
Published: (2010)
by: Tay , Choo Chuan, et al.
Published: (2010)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
Model kemasukan dan Penilaian Kemahiran Insaniah di UTeM
by: Tay, Choo Chuan, et al.
Published: (2010)
by: Tay, Choo Chuan, et al.
Published: (2010)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
A Comparison of Second Order and Non-Second Order Limit Language Generated by Yusof-Goode Splicing System
by: Muhammad Azrin, Ahmad, et al.
Published: (2015)
by: Muhammad Azrin, Ahmad, et al.
Published: (2015)
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019)
by: Seow, Yang Jiin
Published: (2019)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
Aspherical Weight Test for Mixed Monoid Presentation
by: Tay, Choo Chuan, et al.
Published: (2008)
by: Tay, Choo Chuan, et al.
Published: (2008)
Kesferaan Dan Kumpulan Gambar Rajah Bagi Persembahan Monoid Campuran
by: Tay, Choo Chuan, et al.
Published: (2007)
by: Tay, Choo Chuan, et al.
Published: (2007)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Spectrum analysis of speech recognition via discrete Tchebichef transform
by: Ernawan, Ferda, et al.
Published: (2011)
by: Ernawan, Ferda, et al.
Published: (2011)
Building of the enabled web-based GIS participation system: a tool to enhance community participation in city development plan
by: Devaraju, Anusuriya, et al.
Published: (2007)
by: Devaraju, Anusuriya, et al.
Published: (2007)
Hunting for Second Copy of Proline-Rich EVHI Ligand (PREL) Family Genes in Danio Rerio Genome
by: Tay, Ai Peng
Published: (2010)
by: Tay, Ai Peng
Published: (2010)
Search for pair production of second-generation leptoquarks at s =13 TeV
by: Sirunyan, A. M., et al.
Published: (2019)
by: Sirunyan, A. M., et al.
Published: (2019)
A practical and user friendly interface of fuzzy logic rule based system for maintenance policy decision making
by: Hasan Basari, Abd. Samad, et al.
Published: (2008)
by: Hasan Basari, Abd. Samad, et al.
Published: (2008)
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Combination of second generation feedstocks as a strategy for bacterial endoglucanase production / Oke Mushafau Adebayo
by: Oke, Mushafau Adebayo
Published: (2016)
by: Oke, Mushafau Adebayo
Published: (2016)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Password practices of Swedish websites
by: Lim, Nena, et al.
Published: (2010)
by: Lim, Nena, et al.
Published: (2010)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Network authentication with time expired scheme and random generated password / Muhamad Syuhaimi Baharuddin
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
Combinatoric Drag–Pattern-Graphical-Password (DPGP)
by: Sylla, Mohamed, et al.
Published: (2013)
by: Sylla, Mohamed, et al.
Published: (2013)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
High-level disinfectant can kill human coronavirus in 30 seconds
by: Mimi Rabita, Abdul Wahit
Published: (2020)
by: Mimi Rabita, Abdul Wahit
Published: (2020)
Solution Manual of Differential Equations
by: Tay , Choo Chuan, et al.
Published: (2008)
by: Tay , Choo Chuan, et al.
Published: (2008)
Similar Items
-
Solution Manual of Engineering Mathematics (module 5)
by: Tay, Choo Chuan, et al.
Published: (2008) -
Integrated Features by Administering the Support Vector Machine of Translational Initiations Sites in Alternative Polymorphic Context
by: Nanna Suryana, Herman, et al.
Published: (2012) -
Transformation of Neill Mapping Function For GPS Tropospheric Delay
by: Hamzah , Sakidin, et al.
Published: (2012) -
Solution Manual of Elementary Mathematics (module 8)
by: Tay, Choo Chuan, et al.
Published: (2008) -
Practical database design for industrial maintenance system
by: Hasan Basari, Abd Samad, et al.
Published: (2010)