Journal articles on the topic 'Hash password'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hash password.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Natho, Parinya, Suwit Somsuphaprungyos, Salinun Boonmee, and Sangtong Boonying. "Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm." International Journal of Reconfigurable and Embedded Systems (IJRES) 13, no. 3 (2024): 502. http://dx.doi.org/10.11591/ijres.v13.i3.pp502-511.
Full textRahmadi, Haikal, and Ary Bayu Nurwicaksono. "Hash Value Security Improvement of PCS Password using Signed Binary Operation." Jurnal Masyarakat Informatika 15, no. 1 (2024): 31–38. http://dx.doi.org/10.14710/jmasif.15.1.62545.
Full textWu, Tianjun, Yuexiang Yang, Chi Wang, and Rui Wang. "Study on Massive-Scale Slow-Hash Recovery Using Unified Probabilistic Context-Free Grammar and Symmetrical Collaborative Prioritization with Parallel Machines." Symmetry 11, no. 4 (2019): 450. http://dx.doi.org/10.3390/sym11040450.
Full textRodwald, Przemysław, and Bartosz Biernacik. "Password protection in IT systems." Bulletin of the Military University of Technology 67, no. 1 (2018): 73–92. http://dx.doi.org/10.5604/01.3001.0011.8036.
Full textShiva, Kumar G. V., Devananda S. N. Dr, and G. K. Suhas. "Enhanced Authentication Mechanism using Negative Password: An Approach for Intrusion Detection." Recent Innovations in Wireless Network Security 3, no. 1 (2021): 1–7. https://doi.org/10.5281/zenodo.4709674.
Full textБАГРІЙ, РУСЛАН, ОЛЕКСАНДР БАРМАК та ЕДУАРД МАНЗЮК. "ПІДВИЩЕННЯ СТІЙКОСТІ ПАРОЛІВ У ВЕБ-СИСТЕМАХ ЗА ДОПОМОГОЮ ВДОСКОНАЛЕНИХ СХЕМ ХЕШУВАННЯ". Herald of Khmelnytskyi National University. Technical sciences 331, № 1 (2024): 48–51. http://dx.doi.org/10.31891/2307-5732-2024-331-6.
Full textMustafa, Nada Abdul Aziz. "Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2." Wasit Journal of Engineering Sciences 12, no. 2 (2024): 60–70. http://dx.doi.org/10.31185/ejuow.vol12.iss2.502.
Full textAh Kioon, Mary Cindy, Zhao Shun Wang, and Shubra Deb Das. "Security Analysis of MD5 Algorithm in Password Storage." Applied Mechanics and Materials 347-350 (August 2013): 2706–11. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2706.
Full textK., Krishna Prasad, and S. Aithal P. "A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE, PASSWORD AND OTP." International Journal of Advanced Trends in Engineering and Technology 3, no. 1 (2018): 1–11. https://doi.org/10.5281/zenodo.1135255.
Full textMahovich, Olexander, Roman Mykolaichuk, and Vira Mykolaichuk. "RECOMMENDATIONS ON HOW TO CHOOSE A SECURE PASSWORD STORAGE METHOD." Information systems and technologies security, no. 1 (3-4) (2020): 47–51. http://dx.doi.org/10.17721/ists.2020.4.48-52.
Full textKaveri, B. Gursal. "SELECTION OF HONEY WORDS FROM EXISTING USER PASSWORD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 553–59. https://doi.org/10.5281/zenodo.203988.
Full textK., Krishna Prasad, and S. Aithal P. "A COMPARATIVE STUDY ON FINGERPRINT HASH CODE, OTP AND PASSWORD BASED MULTIFACTOR AUTHENTICATION MODEL WITH AN IDEAL SYSTEM AND EXISTING SYSTEMS." International Journal of Applied and Advanced Scientific Research 3, no. 1 (2018): 18–32. https://doi.org/10.5281/zenodo.1149587.
Full textThangavel, T. S., and A. Krishnan. "Provable Secured Hash Password Authentication." International Journal of Computer Applications 1, no. 19 (2010): 39–46. http://dx.doi.org/10.5120/406-602.
Full textLefevre, Charlotte, and Bart Mennink. "Permutation-Based Hash Chains with Application to Password Hashing." IACR Transactions on Symmetric Cryptology 2024, no. 4 (2024): 249–86. https://doi.org/10.46586/tosc.v2024.i4.249-286.
Full textHuang, Qinglong, Haiping Huang, Wenming Wang, Qi Li, and Yuhan Wu. "An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices." Wireless Communications and Mobile Computing 2020 (December 18, 2020): 1–9. http://dx.doi.org/10.1155/2020/8888679.
Full textP., S. Aithal, and Prasad Krishna. "ABCD Analysis of Fingerprint Hash Code, Password and OTP based Multifactor Authentication Model." Saudi Journal of Business and Management Studies 3, no. 1 (2018): 65–80. https://doi.org/10.5281/zenodo.1202336.
Full textP., S. Aithal, and Prasad K. Krishna. "An Alternative Approach to Fingerprint Hash Code Generation based on Modified Filtering Techniques." International Journal of Innovative Research In Management, Engineering And Technology 2, no. 12 (2017): 1–13. https://doi.org/10.5281/zenodo.1161166.
Full textPutra, I. Wayan Ari Pramana, Decky Pratama Putra, I. Gede Wahyu Parama Sucipta, I. Made Edy Listartha, and Gede Arna Jude Saskara. "PERBANDINGAN PASSWORD ATTACKER MENGGUNAKAN TOOLS BARSWF, HASHCAT, HASH CRACKER CONSOLE." Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 3, no. 1 (2023): 32–40. http://dx.doi.org/10.55606/teknik.v3i1.922.
Full textPolpong, Jakkapong, and Pongpisit Wuttidittachotti. "Authentication and password storing improvement using SXR algorithm with a hash function." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6582. http://dx.doi.org/10.11591/ijece.v10i6.pp6582-6591.
Full textJakkapong, Polpong, and Wuttidittachotti Pongpisit. "Authentication and password storing improvement using SXR algorithm with a hash function." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6582–91. https://doi.org/10.11591/ijece.v10i6.pp6582-6591.
Full textEt.al, Won-chi Jung. "Study On Threats To Correct Password Errors Focused On Facebook Cases." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 526–30. http://dx.doi.org/10.17762/turcomat.v12i6.1967.
Full textPutra, Decky Pratama, I. Wayan Ari Pramana Putra, and I. Gede Wahyu Parama Sucipta. "PERBANDINGAN PASSWORD ATTACK MENGGUNAKAN TOOLS BARSHWF, HASHCAT, DAN HASH CRACKER CONSOLE." JTIK (Jurnal Teknik Informatika Kaputama) 7, no. 1 (2023): 181–87. http://dx.doi.org/10.59697/jtik.v7i1.62.
Full textSachin, Jadhav, Jamadar Sana, Lande Pooja, and Mane Gayatri. "A Novel Authentication Framework Using Negative Password Method for Improving Security." Journal of Network Security Computer Networks 5, no. 1 (2019): 1–7. https://doi.org/10.5281/zenodo.2538899.
Full textRodwald, Przemysław. "Choosing a password breaking strategy with imposed time restrictions." Bulletin of the Military University of Technology 68, no. 1 (2019): 79–100. http://dx.doi.org/10.5604/01.3001.0013.1467.
Full textKhursaid, Ansari, and Chaudhary Prajwal. "A Study of Password Stealing Attacks and their Protection Mechanism." Journal of Network Security and Data Mining 5, no. 3 (2022): 1–11. https://doi.org/10.5281/zenodo.7488975.
Full textKalaivani, R. "H3A V1.0 : The Password Cracker." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 3172–78. https://doi.org/10.22214/ijraset.2025.70010.
Full textR, Ranjith, Supreeth S, Ramya R, Ganesh Prasad M, and Chaitra Lakshmi L. "Password Processing Scheme using Enhanced Visual Cryptography and OCR in Hybrid Cloud Environment." International Journal of Engineering and Advanced Technology 8, no. 5s (2019): 150–54. http://dx.doi.org/10.35940/ijeat.e1032.0585s19.
Full textRanjith, R., S. Supreeth, R. Ramya, prasad M. Ganesh, and Lakshmi L. Chaitra. "Password Processing Scheme using Enhanced Visual Cryptography and OCR in Hybrid Cloud Environment." International Journal of Engineering and Advanced Technology (IJEAT) 8, no. 5S, May, 2019 (2019): 150–54. https://doi.org/10.5281/zenodo.7027753.
Full textAsaad, Renas R. "Penetration Testing: Wireless Network Attacks Method on Kali Linux OS." Academic Journal of Nawroz University 10, no. 1 (2021): 7. http://dx.doi.org/10.25007/ajnu.v10n1a998.
Full textAdi, Prajanto Wahyu, and Retno Kusumaningrum. "Pengembangan Sistem Manajemen Naskah Soal dengan Keamanan Pre-Hash Coding." Techno.Com 20, no. 4 (2021): 613–22. http://dx.doi.org/10.33633/tc.v20i4.5271.
Full textBohli, Jens-Matthias, María Isabel González Vasco, and Rainer Steinwandt. "Password–Authenticated Group Key Establishment from Smooth Projective Hash Functions." International Journal of Applied Mathematics and Computer Science 29, no. 4 (2019): 797–815. http://dx.doi.org/10.2478/amcs-2019-0059.
Full textWang, Bang Ju, and Huan Guo Zhang. "Cryptanalysis of a Remote User Authentication Scheme." Applied Mechanics and Materials 433-435 (October 2013): 1699–701. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1699.
Full textYaseen Khudhur, Doaa, Belal Al-Khateeb, and Hadeel Amjed Saeed. "Secure login technique for online banking." International Journal of Engineering & Technology 7, no. 4 (2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.
Full textLiu, Bao Ju, and Jian Xi Wang. "Research on the Network Security Protocols Based on the Strand Spaces Theory." Applied Mechanics and Materials 457-458 (October 2013): 1134–38. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1134.
Full textDagar, Mohit, Nandit Saini, Ashish Sankla, and Himanshu Naresh. "Unicrypt: A Constructive Approach Towards Rainbow Table Vulnerability." Journal of Advance Research in Applied Science (ISSN: 2208-2352) 2, no. 5 (2015): 01–08. http://dx.doi.org/10.53555/nnas.v2i5.678.
Full textHossain, Monir, Momotaz Begum, Bimal Chandra Das, and Jia Uddin. "A cost-effective counterfeiting prevention method using hashing, QR code, and website." International Journal of Advances in Applied Sciences 13, no. 2 (2024): 351. http://dx.doi.org/10.11591/ijaas.v13.i2.pp351-359.
Full textMonir, Hossain, Begum Momotaz, Chandra Das Bimal, and Uddin Jia. "A cost-effective counterfeiting prevention method using hashing, QR code, and website." International Journal of Advances in Applied Sciences (IJAAS) 13, no. 2 (2024): 351–59. https://doi.org/10.11591/ijaas.v13.i2.pp351-359.
Full textNAZIA, NUSRATH UL AIN. "PASSWORD AUTHENTICATION USING IMAGE DECIPHERMENT AND OCR." IJIERT - International Journal of Innovations in Engineering Research and Technology 5, no. 3 (2018): 30–36. https://doi.org/10.5281/zenodo.1454074.
Full textYin, Anqi, Yuanbo Guo, Yuanming Song, Tongzhou Qu, and Chen Fang. "Two-Round Password-Based Authenticated Key Exchange from Lattices." Wireless Communications and Mobile Computing 2020 (December 14, 2020): 1–13. http://dx.doi.org/10.1155/2020/8893628.
Full textPanjaitan, Zaimah, Erika Fahmi Ginting, and Yusnidah Yusnidah. "Modifikasi SHA-256 dengan Algoritma Hill Cipher untuk Pengamanan Fungsi Hash dari Upaya Decode Hash." Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) 19, no. 1 (2020): 53. http://dx.doi.org/10.53513/jis.v19i1.225.
Full textYin, Xinming, Junhui He, Yi Guo, Dezhi Han, Kuan-Ching Li, and Arcangelo Castiglione. "An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree." Sensors 20, no. 20 (2020): 5735. http://dx.doi.org/10.3390/s20205735.
Full textHariono, Tholib, Muhammad Iqbal, Nurul Yaqin, and Hilyah Ashoumi. "Web-based Academic Information System Security." NEWTON: Networking and Information Technology 3, no. 1 (2024): 27–31. http://dx.doi.org/10.32764/newton.v3i1.4453.
Full textAnbari, Muhamad Zaki, and Bambang Sugiantoro. "Enhancing the resistance of password hashing using binary randomization through logical gates." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 5 (2024): 5400. http://dx.doi.org/10.11591/ijece.v14i5.pp5400-5407.
Full textAmbedkar, Bhagvant Ram. "Enhancing the Performance of Cryptographic Hash Function Using 2080 Bits Proposed Secure Hash Algorithm 160." International Journal of Scientific Research in Network Security and Communication 13, no. 1 (2025): 8–11. https://doi.org/10.26438/ijsrnsc.v13i1.264.
Full textAgusniar, Cut, Ira Fazira, and Laili Wahyunita. "Implementation of the Secure Hashing Algorithm-512 (SHA-512) for Sign-Up Page Security in the KelasSeru Tutoring System." Journal of Advanced Computer Knowledge and Algorithms 2, no. 1 (2025): 19–23. https://doi.org/10.29103/jacka.v2i1.20320.
Full textPervan, Branimir, Josip Knezović, and Emanuel Guberović. "Energy-efficient distributed password hash computation on heterogeneous embedded system." Automatika 63, no. 3 (2022): 399–417. http://dx.doi.org/10.1080/00051144.2022.2042115.
Full textAli, Muhammad Helmi, Eddie Shahril Ismail, and Firdaus Mohamad Hamzah. "A Practical and Secure Hash Function-Based Password Authentication Scheme." Journal of Computer Science 15, no. 7 (2019): 954–60. http://dx.doi.org/10.3844/jcssp.2019.954.960.
Full textKu, Wei-Chi, Chien-Ming Chen, and Hui-Lung Lee. "Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme." ACM SIGOPS Operating Systems Review 37, no. 4 (2003): 19–25. http://dx.doi.org/10.1145/958965.958967.
Full textKu, Wei-Chi, Min-Hung Chiang, and Shen-Tien Chang. "Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme." ACM SIGOPS Operating Systems Review 39, no. 1 (2005): 85–89. http://dx.doi.org/10.1145/1044552.1044561.
Full textDiNardi, Michael, and Damu Radhakrishnan. "SHA-256 Hash Function on Intel DE10 Lite FPGA." International Journal for Research in Applied Science and Engineering Technology 11, no. 12 (2023): 1175–84. http://dx.doi.org/10.22214/ijraset.2023.57521.
Full text