Listing 1 - 10 of 38 | << page >> |
Sort by
|
Choose an application
Computers --- Access control --- Passwords.
Choose an application
Authentication. --- Computers --- Access control --- Passwords.
Choose an application
Computers --- Taxonomy. --- Access control --- Passwords.
Choose an application
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate se
Computer security. --- Computers --- Access control --- Passwords.
Choose an application
Password entry on mobile devices significantly impacts both usability and security, but there is a lack of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength metrics to passwords for which we already had usability data, in an effort to have a more meaningful comparison between usability and security. This document reports a method of optimizing the input of randomly generated passwords on mobile devices via password permutation to allow for a comparison of password usability data. We found that the number of keystrokes saved the efficiency gained via permutation depends on the number of onscreen keyboard changes required in the original password rather than on password length. Additionally, we created and are releasing Python scripts (publicly available from https://github.com/usnistgov/PasswordMetrics) for the experiments on entropy loss we conducted across passwords ranging in length from 5 to 20 characters.
Computers --- Mobile communication systems. --- Access control --- Passwords.
Choose an application
Computers --- Internet --- Access control --- Passwords --- Security measures
Choose an application
Computers --- Computer security --- Access control --- Passwords --- Standards --- Government policy
Choose an application
Identification --- Passing (Identity) --- Authentication --- Security systems --- Computers --- Access control --- Passwords
Choose an application
Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.--
Computers --- Cryptography. --- Electronic surveillance. --- Philology. --- Data encryption (Computer science) --- Access control --- Passwords.
Choose an application
Computer networks --- Computers --- Authentication. --- Digital signatures. --- Security measures. --- Access control. --- Access control --- Passwords.
Listing 1 - 10 of 38 | << page >> |
Sort by
|