Academic literature on the topic 'Hash password'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hash password.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hash password"
Natho, Parinya, Suwit Somsuphaprungyos, Salinun Boonmee, and Sangtong Boonying. "Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm." International Journal of Reconfigurable and Embedded Systems (IJRES) 13, no. 3 (2024): 502. http://dx.doi.org/10.11591/ijres.v13.i3.pp502-511.
Full textRahmadi, Haikal, and Ary Bayu Nurwicaksono. "Hash Value Security Improvement of PCS Password using Signed Binary Operation." Jurnal Masyarakat Informatika 15, no. 1 (2024): 31–38. http://dx.doi.org/10.14710/jmasif.15.1.62545.
Full textWu, Tianjun, Yuexiang Yang, Chi Wang, and Rui Wang. "Study on Massive-Scale Slow-Hash Recovery Using Unified Probabilistic Context-Free Grammar and Symmetrical Collaborative Prioritization with Parallel Machines." Symmetry 11, no. 4 (2019): 450. http://dx.doi.org/10.3390/sym11040450.
Full textRodwald, Przemysław, and Bartosz Biernacik. "Password protection in IT systems." Bulletin of the Military University of Technology 67, no. 1 (2018): 73–92. http://dx.doi.org/10.5604/01.3001.0011.8036.
Full textShiva, Kumar G. V., Devananda S. N. Dr, and G. K. Suhas. "Enhanced Authentication Mechanism using Negative Password: An Approach for Intrusion Detection." Recent Innovations in Wireless Network Security 3, no. 1 (2021): 1–7. https://doi.org/10.5281/zenodo.4709674.
Full textБАГРІЙ, РУСЛАН, ОЛЕКСАНДР БАРМАК та ЕДУАРД МАНЗЮК. "ПІДВИЩЕННЯ СТІЙКОСТІ ПАРОЛІВ У ВЕБ-СИСТЕМАХ ЗА ДОПОМОГОЮ ВДОСКОНАЛЕНИХ СХЕМ ХЕШУВАННЯ". Herald of Khmelnytskyi National University. Technical sciences 331, № 1 (2024): 48–51. http://dx.doi.org/10.31891/2307-5732-2024-331-6.
Full textMustafa, Nada Abdul Aziz. "Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2." Wasit Journal of Engineering Sciences 12, no. 2 (2024): 60–70. http://dx.doi.org/10.31185/ejuow.vol12.iss2.502.
Full textAh Kioon, Mary Cindy, Zhao Shun Wang, and Shubra Deb Das. "Security Analysis of MD5 Algorithm in Password Storage." Applied Mechanics and Materials 347-350 (August 2013): 2706–11. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2706.
Full textK., Krishna Prasad, and S. Aithal P. "A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE, PASSWORD AND OTP." International Journal of Advanced Trends in Engineering and Technology 3, no. 1 (2018): 1–11. https://doi.org/10.5281/zenodo.1135255.
Full textMahovich, Olexander, Roman Mykolaichuk, and Vira Mykolaichuk. "RECOMMENDATIONS ON HOW TO CHOOSE A SECURE PASSWORD STORAGE METHOD." Information systems and technologies security, no. 1 (3-4) (2020): 47–51. http://dx.doi.org/10.17721/ists.2020.4.48-52.
Full textDissertations / Theses on the topic "Hash password"
Pavlík, Martin. "Metody ukládání uživatelských hesel v operačních systémech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218113.
Full textAndrade, Alicia. "Características y aplicaciones de las funciones resumen criptográficas en la gestión de contraseñas." Doctoral thesis, Universidad de Alicante, 2019. http://hdl.handle.net/10045/96849.
Full textAndrade, Ewerton Rodrigues. "Lyra2: password hashing scheme with improved security against time-memory trade-offs." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-26082016-150620/.
Full textKos, Ondřej. "Obnova hesel v distribuovaném prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255460.
Full textLoreti, Ludovico. "Pass The Hash attack. Panoramica, sperimentazione ed analisi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17297/.
Full textValois, Mathieu. "Mesure de la robustesse des mots de passe." Thesis, Normandie, 2019. http://www.theses.fr/2019NORMC251.
Full textChen, Chien-Ming, and 陳建銘. "Attacks and Solutions on Hash-Based Password Authentication Protocols." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/48560547181513911733.
Full textTsai, Hao-Chuan, and 蔡濠全. "A Study of Hash-Based One-Time Password Authentication Protocols." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/87766138000061871580.
Full textLuh, Sing-Hung, and 盧信宏. "The Implementation of One-Time Password’s Mobile Devices Based on SMS and Hash." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/09278855987151759021.
Full textBooks on the topic "Hash password"
Hash Crack: Password Cracking Manual. CreateSpace Independent Publishing Platform, 2017.
Find full textPicolet, Joshua. Hash Crack: Password Cracking Manual. Independently Published, 2019.
Find full textPotter, Beatrix. Peter Hase Passwortbuch / Passwort Logbuch. Books on Demand GmbH, 2018.
Find full textO'Neill, Kevin. Internet Afterlife. ABC-CLIO, LLC, 2016. http://dx.doi.org/10.5040/9798400671654.
Full textBook chapters on the topic "Hash password"
Wagner, Urs, and Thomas Lugrin. "Hash Functions." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_5.
Full textAssiri, Sareh, and Bertrand Cambou. "Homomorphic Password Manager Using Multiple-Hash with PUF." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73100-7_55.
Full textJung, Hyunhee, and Hyun Sung Kim. "Secure Hash-Based Password Authentication Protocol Using Smartcards." In Computational Science and Its Applications - ICCSA 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21934-4_48.
Full textEldefrawy, Mohamed Hamdy, Muhammad Khurram Khan, and Khaled Alghathbar. "One-Time Password System with Infinite Nested Hash Chains." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17610-4_18.
Full textBakhtiari, S., R. Safavi-Naini, and J. Pieprzyk. "On password-based authenticated key exchange using collisionful hash functions." In Information Security and Privacy. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0023308.
Full textSharma, Ankit, and Kriti Bhushan. "An Encrypted Hash Based Password Technique to Prevent DDoS Attacks in MQTT." In Advances in Intelligent Systems and Computing. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-40905-9_8.
Full textChenchev, Ivaylo, Ognian Nakov, and Milena Lazarova. "Security and Performance Considerations of Improved Password Authentication Algorithm, Based on OTP and Hash-Chains." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63092-8_63.
Full textAhmad, Javed, Chaudhary Wali Mohammad, and Mohd Sadiq. "Generation of One-Time Password for the Authentication of Software Requirements Using Secure Hash Algorithms." In Proceedings of International Conference on Recent Trends in Computing. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7118-0_54.
Full textLee, Youngsook, and Dongho Won. "On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol." In Grid and Pervasive Computing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38027-3_80.
Full textChatzoglou, Efstratios, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, and Georgios Kambourakis. "Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers." In ICT Systems Security and Privacy Protection. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65175-5_5.
Full textConference papers on the topic "Hash password"
Sharma, Akshat, Siddhant Thapliyal, Mohammad Wazid, Amit Kumar Mishra, Prince Kumar, and Debasis Giri. "A Secure Mechanism for Password Hash Value Generator with the Security Analysis of Various Hashing Algorithms." In 2024 4th International Conference on Computer, Communication, Control & Information Technology (C3IT). IEEE, 2024. https://doi.org/10.1109/c3it60531.2024.10829444.
Full textJan, Muhammad Shahzad, and Mehreen Afzal. "Hash chain based strong password authentication scheme." In 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2016. http://dx.doi.org/10.1109/ibcast.2016.7429902.
Full text"A Secure Hash-Based Strong-Password Authentication Scheme." In The 3rd International Workshop on Security In Information Systems. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0002541700130020.
Full textZhang, Yanbin, Xiang Zhang, Dongsheng Zhao, Mingyan He, and Xiaoyan Jiang. "Research on Commercial Password Design and Unified Password Monitoring Platform Based on Hash Function." In CNSCT 2024: 2024 3rd International Conference on Cryptography, Network Security and Communication Technology. ACM, 2024. http://dx.doi.org/10.1145/3673277.3673286.
Full textSrinivasan, Avinash, Anthony Nguyen, and Robert Tarlecki. "STUMP - STalling offline password attacks Using pre-hash ManiPulations." In 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2015. http://dx.doi.org/10.1109/icpads.2015.46.
Full textGregório, Pietro, та Denise Goya. "Hash Criptográfico sobre Senhas e Aleatoriedade do Argon2∗". У XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbseg_estendido.2019.14008.
Full textNugroho, Agung, and Teddy Mantoro. "Salt Hash Password Using MD5 Combination for Dictionary Attack Protection." In 2023 6th International Conference of Computer and Informatics Engineering (IC2IE). IEEE, 2023. http://dx.doi.org/10.1109/ic2ie60547.2023.10331606.
Full textBlocki, Jeremiah, and Anupam Datta. "CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection." In 2016 IEEE 29th Computer Security Foundations Symposium (CSF). IEEE, 2016. http://dx.doi.org/10.1109/csf.2016.33.
Full textChethana, Savarala, Sreevathsa Sree Charan, Vemula Srihitha, D. Radha, and C. R. Kavitha. "Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm." In 2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon). IEEE, 2022. http://dx.doi.org/10.1109/nkcon56289.2022.10127057.
Full textGao, Fengxiu, Fushan Wei, and Chuangui Ma. "Gateway-Oriented Password-Authenticated Key Exchange Based on Chameleon Hash Function." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478530.
Full textReports on the topic "Hash password"
MacDonald, Stuart, Connor Rees, and Joost S. Remove, Impede, Disrupt, Redirect: Understanding & Combating Pro-Islamic State Use of File-Sharing Platforms. RESOLVE Network, 2022. http://dx.doi.org/10.37805/ogrr2022.1.
Full text