Academic literature on the topic 'Life; Password'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Life; Password.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Life; Password"
Taneski, Viktor, Marko Kompara, Marjan Heričko, and Boštjan Brumen. "Strength Analysis of Real-Life Passwords Using Markov Models." Applied Sciences 11, no. 20 (2021): 9406. http://dx.doi.org/10.3390/app11209406.
Full textShinde, Shivam K. "A Study for an Ideal Password Management System." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 976–80. http://dx.doi.org/10.22214/ijraset.2022.39970.
Full textYu, Xiaoying, and Qi Liao. "User password repetitive patterns analysis and visualization." Information & Computer Security 24, no. 1 (2016): 93–115. http://dx.doi.org/10.1108/ics-06-2015-0026.
Full textShriwastava, Rakesh G., Pawan C. Tapre, Rajendra M. Rewatkar, et al. "Hardware implementation of safety smart password based GSM module controlling circuit breaker." International Journal of Applied Power Engineering (IJAPE) 14, no. 2 (2025): 441. https://doi.org/10.11591/ijape.v14.i2.pp441-448.
Full textLin, Tsung-Hung, Cheng-Chi Lee, Chwei-Shyong Tsai, and Shin-Dong Guo. "A tabular steganography scheme for graphical password authentication." Computer Science and Information Systems 7, no. 4 (2010): 823–41. http://dx.doi.org/10.2298/csis081223028l.
Full textStobert, Elizabeth, and Robert Biddle. "The Password Life Cycle." ACM Transactions on Privacy and Security 21, no. 3 (2018): 1–32. http://dx.doi.org/10.1145/3183341.
Full textKhair, Ummul, Arief Budiman, and Kalvin Chiuloto. "Keamanan AKun Web dengan Time Based One Time Password." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 6, no. 1 (2025): 54–63. https://doi.org/10.35447/jikstra.v6i1.1072.
Full textShriwastava, Dr Rakesh G. "Smart Safety with Password Based GSM Module Controlling Circuit Breaker." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 2148–54. http://dx.doi.org/10.22214/ijraset.2024.62038.
Full textYounis MOSTAFA, Ehab, and Saja J. MOHAMMED. "THE LANDSCAPE OF AUTHENTICATION SYSTEMS: A COMPREHENSIVE SURVEY." MINAR International Journal of Applied Sciences and Technology 05, no. 04 (2023): 01–16. http://dx.doi.org/10.47832/2717-8234.17.1.
Full textJavorskiy, Dmitriy. "“Passwords” and “concepts” in religious speech (philosophical and linguistic analysis)." St. Tikhons' University Review 116 (December 31, 2024): 59–73. https://doi.org/10.15382/sturi2024116.59-73.
Full textDissertations / Theses on the topic "Life; Password"
Ko, Yi-Ting, and 葛怡婷. "「Father's happiness password」- a narrative research for a polio patient's life story." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/36089377059452526303.
Full textBurešová, Martina. "Bezpečí seniorů v internetovém prostoru." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-335139.
Full textLu, Zebin. "SECURE WEB APPLICATIONS AGAINST OFF-LINE PASSWORD GUESSING ATTACK: A TWO WAY PASSWORD PROTOCOL WITH CHALLENGE RESPONSE USING ARBITRARY IMAGES." 2013. http://hdl.handle.net/1805/3425.
Full textCho, Shiao-Her, and 卓小鶴. "A Mobile Authentication Scheme to Defend Off-line Password Guessing Attacks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/js6bt8.
Full textBooks on the topic "Life; Password"
Password Book: Internet Password , Passwords Web Addresses Alphabetical Sort , Logins and Web Addresses, Login Information Keeper , Internet Password Book , , Ball Is Life, Protect Usernames and Passwords , Alphabetical Password B. Independently Published, 2021.
Find full textPasswords Your Life: It's a Address Book - Password Book, Modern Password Keeper, Password Tracker Password Log Book and Internet Password Organizer, Alphabetical Password Boo-Book Small 6 X 9 Vintage Flower Dull Cover. Independently Published, 2020.
Find full textPassword Book: Sea Life Design Log for Web Accounts and Passwords. Independently Published, 2021.
Find full textCat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.
Find full textCat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.
Find full textCat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.
Find full textCat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.
Find full textpasswordbook, Claurdiazal. Cat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.
Find full textCat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.
Find full textBook chapters on the topic "Life; Password"
Kumar, Deepak, Uma Kant Gautam, and B. R. Chandavarkar. "One Time Password (OTP) Life Cycle and Challenges: Case Study." In Lecture Notes in Electrical Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7961-5_13.
Full textFietkau, Julian, Syeda Mehak Zahra, and Markus Hartung. "Secure Authentication for Everyone! Enabling 2nd-Factor Authentication Under Real-World Constraints." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_8.
Full textJakobsson, Markus, and Ruj Akavipat. "Like Passwords: But Faster, Easier and More Secure." In SpringerBriefs in Computer Science. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-4878-5_4.
Full textAl-Ameen, Mahdi Nasrullah, Kanis Fatema, Matthew Wright, and Shannon Scielzo. "Leveraging Real-Life Facts to Make Random Passwords More Memorable." In Computer Security -- ESORICS 2015. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24177-7_22.
Full textMatelski, Sławomir. "Secure Human Identification Protocol with Human-Computable Passwords." In Information Security Practice and Experience. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21280-2_25.
Full textFandakly, Thaier, and Nicholas Caporusso. "Beyond Passwords: Enforcing Username Security as the First Line of Defense." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20488-4_5.
Full textWang, Yongge. "Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_40.
Full textBonneau, Joseph. "Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords." In Security Protocols XIX. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25867-1_8.
Full textKwon, Jeong Ok, Kouichi Sakurai, and Dong Hoon Lee. "Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks." In Computational Science – ICCS 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11758501_152.
Full textEl-Taj, Homam, Reema Albuluwi, Lulua Alshumesi, Lamar Miralam, Rania Alammari, and Hagar Amer. "Through the Lens: A Deep Dive into IP Camera Security and Privacy Challenges." In Proceedings in Technology Transfer. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-8588-9_12.
Full textConference papers on the topic "Life; Password"
Hayashi, Eiji, and Jason Hong. "A diary study of password usage in daily life." In the 2011 annual conference. ACM Press, 2011. http://dx.doi.org/10.1145/1978942.1979326.
Full textRekha, N. Rukma, Y. V. Subba Rao, and K. V. S. S. R. S. S. Sarma. "Enhanced Key Life in Online Authentication Systems Using Virtual Password." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.71.
Full textK, Malar, Nayan Kumar S, Ravi N, Rohith Kumar G M, and Yuva Kishor T M. "Eye blink Password Based Secure Authentication." In International Conference on Recent Trends in Computing & Communication Technologies (ICRCCT’2K24). International Journal of Advanced Trends in Engineering and Management, 2024. http://dx.doi.org/10.59544/yrww2570/icrcct24p3.
Full textCamacho, Giovanna, Matthew Bolton, Jingan Peng, and Prashanth Wagle. "A Formal Method for the Analysis of the Veteran’s Ebenefits’ Website." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003779.
Full textTripathi, Santosh K., Swati Maurya, Ajeet Kumar, Koshtubh S. Raj, and Rajneesh Rawat. "IOT-BASED SMART ENERGY METER READING AND BILLING SYSTEM." In Computing for Sustainable Innovation: Shaping Tomorrow’s World. Innovative Research Publication, 2024. http://dx.doi.org/10.55524/csistw.2024.12.1.61.
Full textWoo, Simon, Elsi Kaiser, Ron Artstein, and Jelena Mirkovic. "Life-experience passwords (LEPs)." In ACSAC '16: 2016 Annual Computer Security Applications Conference. ACM, 2016. http://dx.doi.org/10.1145/2991079.2991107.
Full textRadescu, Radu, and Sever Pasca. "ENHANCING THE SECURITY LEVEL OF THE NEW VERSION OF THE EASY-LEARNING ONLINE PLATFORM." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-108.
Full textRavichandran, Lavanya, Aditya Vadlamani, Revathy Kt, and Prabhakar Tadinada. "Moving An Institute Online - Challenges and Experiences." In Tenth Pan-Commonwealth Forum on Open Learning. Commonwealth of Learning, 2022. http://dx.doi.org/10.56059/pcf10.1245.
Full textYuichi Kobayashi, Toshiyuki Kuwana, Yoji Taniguchi, and Norihisa Komoda. "Group management system of RFID passwords for item life cycle." In 2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007). IEEE, 2007. http://dx.doi.org/10.1109/efta.2007.4416873.
Full textSuga, Yuji. "An Extended Lamport-Like One-Time Password Scheme and its Applications." In 2018 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia). IEEE, 2018. http://dx.doi.org/10.1109/icce-asia.2018.8552134.
Full text