Academic literature on the topic 'Life; Password'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Life; Password.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Life; Password"

1

Taneski, Viktor, Marko Kompara, Marjan Heričko, and Boštjan Brumen. "Strength Analysis of Real-Life Passwords Using Markov Models." Applied Sciences 11, no. 20 (2021): 9406. http://dx.doi.org/10.3390/app11209406.

Full text
Abstract:
Recent literature proposes the use of a proactive password checker as method for preventing users from creating easy-to-guess passwords. Markov models can help us create a more effective password checker that would be able to check the probability of a given password to be chosen by an attacker. We investigate the ability of different Markov models to calculate a variety of passwords from different topics, in order to find out whether one Markov model is sufficient for creating a more effective password checker. The results of our study show that multiple models are required in order to be abl
APA, Harvard, Vancouver, ISO, and other styles
2

Shinde, Shivam K. "A Study for an Ideal Password Management System." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 976–80. http://dx.doi.org/10.22214/ijraset.2022.39970.

Full text
Abstract:
Abstract: The growing number of online services needs users to have control over their password management system (generation, storage, recall). But the demand for total randomness and exclusivity of passwords is impractical in day-to-day life. Each component of a password management system comes with its cognitive burden on a user. There are many password management solutions available for users but every one of them has some drawbacks. Password managers have the ability to help users manage their passwords more successfully while also addressing many of the problems about password-based auth
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Xiaoying, and Qi Liao. "User password repetitive patterns analysis and visualization." Information & Computer Security 24, no. 1 (2016): 93–115. http://dx.doi.org/10.1108/ics-06-2015-0026.

Full text
Abstract:
Purpose – Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical to the security of our systems. However, due to the explosion of user accounts and increasing complexity of password rules, users are struggling to find ways to make up sufficiently secure yet easy-to-remember passwords. This paper aims to investigate whether there are repetitive patterns when users choose passwords and how such behaviors may affect us to rethink password security policy. Design/methodology/approach
APA, Harvard, Vancouver, ISO, and other styles
4

Shriwastava, Rakesh G., Pawan C. Tapre, Rajendra M. Rewatkar, et al. "Hardware implementation of safety smart password based GSM module controlling circuit breaker." International Journal of Applied Power Engineering (IJAPE) 14, no. 2 (2025): 441. https://doi.org/10.11591/ijape.v14.i2.pp441-448.

Full text
Abstract:
This research work highlights the hardware implementation of safety smart password-based GSM module controlling circuit breaker. Safety is the major concern in daily life for domestic activities. In current scenario, accidental death of a lineman are the major issues and to protect operators for the same. To control circuit breakers, passwords security is essential for lineman. Due to that electrical accident’s ratio is increased day to day life at the time of repairing the lines. It is also done due to lack of communication and coordination between maintenance and substation. For safety of li
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Tsung-Hung, Cheng-Chi Lee, Chwei-Shyong Tsai, and Shin-Dong Guo. "A tabular steganography scheme for graphical password authentication." Computer Science and Information Systems 7, no. 4 (2010): 823–41. http://dx.doi.org/10.2298/csis081223028l.

Full text
Abstract:
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical pas
APA, Harvard, Vancouver, ISO, and other styles
6

Stobert, Elizabeth, and Robert Biddle. "The Password Life Cycle." ACM Transactions on Privacy and Security 21, no. 3 (2018): 1–32. http://dx.doi.org/10.1145/3183341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khair, Ummul, Arief Budiman, and Kalvin Chiuloto. "Keamanan AKun Web dengan Time Based One Time Password." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 6, no. 1 (2025): 54–63. https://doi.org/10.35447/jikstra.v6i1.1072.

Full text
Abstract:
The rapid development of technology with the large number of people using the internet for daily needs makes it easier to interact and search for information more quickly and precisely. So that comfort is also felt by many parties making transactions, but it needs to be taken into account that when you increasingly want comfort, security also really needs to be considered. Because comfort is inversely proportional to security, the more users want comfort, the more users must pay attention to security. Using the internet in everyday life has become commonplace now, so using a password to secure
APA, Harvard, Vancouver, ISO, and other styles
8

Shriwastava, Dr Rakesh G. "Smart Safety with Password Based GSM Module Controlling Circuit Breaker." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 2148–54. http://dx.doi.org/10.22214/ijraset.2024.62038.

Full text
Abstract:
Abstract: This paper focus on Smart safety with password based GSM module controlling circuit breaker. In our daily life, Safety is the major concern for all activities. Accidental death of a lineman is often read and proven in current scenario. In view, safety measures to protect operators are considered to be very necessary in current working. Using passwords for security, Electrical lineman security systems are used to control circuit breakers. Serious electrical accidents occurs becoming increasingly, when repairing power lines. It is happen due to lack of communication and coordination be
APA, Harvard, Vancouver, ISO, and other styles
9

Younis MOSTAFA, Ehab, and Saja J. MOHAMMED. "THE LANDSCAPE OF AUTHENTICATION SYSTEMS: A COMPREHENSIVE SURVEY." MINAR International Journal of Applied Sciences and Technology 05, no. 04 (2023): 01–16. http://dx.doi.org/10.47832/2717-8234.17.1.

Full text
Abstract:
Nowadays, authentication systems are extremely important in many aspects of digital life. They help to protect personal and confidential data from unauthorized access. authentication systems are effective ways to prevent hacking and fraud attacks. Also, They are crucial in ensuring digital security and protecting sensitive data in our connected world. The authentication can be done in multiple ways, one of which is using a password, such system is called a password-based authentication system. Password is the basic and most common method of authentication. This paper overviews the authenticati
APA, Harvard, Vancouver, ISO, and other styles
10

Javorskiy, Dmitriy. "“Passwords” and “concepts” in religious speech (philosophical and linguistic analysis)." St. Tikhons' University Review 116 (December 31, 2024): 59–73. https://doi.org/10.15382/sturi2024116.59-73.

Full text
Abstract:
The article distinguishes two modes of using words and expressions in religious speech and, accordingly, two forms of words and expressions: “passwords” and “concepts”. Password mode is used to request and demonstrate a believer's commitment to their religious community. The conceptual mode is used to expand, correct, and clarify religious teachings. In password mode, uttering the statement “God exists” means for those listening that the speaker belongs to a certain community (for example, a community of believers). In the conceptual mode, the statement “God exists” is a proposition that entai
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Life; Password"

1

Ko, Yi-Ting, and 葛怡婷. "「Father's happiness password」- a narrative research for a polio patient's life story." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/36089377059452526303.

Full text
Abstract:
碩士<br>國立屏東教育大學<br>體育學系碩士班<br>101<br>The purpose of this study was to investigate a polio patient's (author's father) life story. The story is elucidated to understand his life, and to know how he went through and overcame his physical disability with difficult conditions by virtue of his happiness password. Also, how he can live, encounter, and explore his wonderful life like normal humankind, with a positive and optimistic attitude. In order to dig in the private story of the patient’s happiness password, narrative research method was performed. It was engaged in data collection, interviews,
APA, Harvard, Vancouver, ISO, and other styles
2

Burešová, Martina. "Bezpečí seniorů v internetovém prostoru." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-335139.

Full text
Abstract:
DIPLOMOVÁ PRÁCE The safety of seniors in the Internet cyberspace Ing. Martina Burešová Praha 2015 This thesis focuses on issues of use of Internet environment by seniors. I deal with benefits and risks of the cyberspace. I describe how the Internet environmet can affect the quality of life. Specific risks and actions to prevent them are defined theoretically. The theoretical description is afterwards enhanced by actual experience from my long-term work of teaching courses on computers to seniors and handicapped people. I present examples of good practice. In the practical part, I concentrate o
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Zebin. "SECURE WEB APPLICATIONS AGAINST OFF-LINE PASSWORD GUESSING ATTACK: A TWO WAY PASSWORD PROTOCOL WITH CHALLENGE RESPONSE USING ARBITRARY IMAGES." 2013. http://hdl.handle.net/1805/3425.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>The web applications are now being used in many security oriented areas, including online shopping, e-commerce, which require the users to transmit sensitive information on the Internet. Therefore, to successfully authenticate each party of web applications is very important. A popular deployed technique for web authentication is the Hypertext Transfer Protocol Secure (HTTPS) protocol. However the protocol does not protect the careless users who connect to fraudulent websites from being trapped into tricks. For example, in a ph
APA, Harvard, Vancouver, ISO, and other styles
4

Cho, Shiao-Her, and 卓小鶴. "A Mobile Authentication Scheme to Defend Off-line Password Guessing Attacks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/js6bt8.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊管理學系碩士在職專班<br>105<br>Security is an essential requirement in wireless communication environments, be-cause hackers can intercept any information spread wirelessly. Therefore, an authentica-tion scheme is a necessary mechanism to ensure the security of data communications. Lin proposed a public key encryption authentication scheme using chaotic maps. After that, Islam et al. pointed out the weaknesses of Lin’s scheme and proposed an authenti-cation scheme with enhanced chaotic maps. However, in our study, we have found sev-eral weaknesses of Islam et al.’s scheme, such as it
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Life; Password"

1

ZHU, ZHU ZHENG SHENG. life make up the password. Light out, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Password Book: Internet Password , Passwords Web Addresses Alphabetical Sort , Logins and Web Addresses, Login Information Keeper , Internet Password Book , , Ball Is Life, Protect Usernames and Passwords , Alphabetical Password B. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Passwords Your Life: It's a Address Book - Password Book, Modern Password Keeper, Password Tracker Password Log Book and Internet Password Organizer, Alphabetical Password Boo-Book Small 6 X 9 Vintage Flower Dull Cover. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Password Book: Sea Life Design Log for Web Accounts and Passwords. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

passwordbook, Claurdiazal. Cat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cat's Secret Life: Cat Password Book, Disguised Password Book, Discreet Password Book, Hidden Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, ... small 6 X 9. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Life; Password"

1

Kumar, Deepak, Uma Kant Gautam, and B. R. Chandavarkar. "One Time Password (OTP) Life Cycle and Challenges: Case Study." In Lecture Notes in Electrical Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7961-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fietkau, Julian, Syeda Mehak Zahra, and Markus Hartung. "Secure Authentication for Everyone! Enabling 2nd-Factor Authentication Under Real-World Constraints." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_8.

Full text
Abstract:
AbstractMillions of user accounts have been exposed by data breaches within the last years. The leaked credentials pose a huge threat to many because they can be used for credential stuffing and brute-force attacks across all online services. The best solution for this problem seems to be the use of 2nd-factor authentication, like hardware tokens or one-time passwords. While these are great solutions, they cause many problems for users because they are too expensive, difficult to manage, or just not user-friendly. In this paper, we will present the results of a study that shows that users need
APA, Harvard, Vancouver, ISO, and other styles
3

Jakobsson, Markus, and Ruj Akavipat. "Like Passwords: But Faster, Easier and More Secure." In SpringerBriefs in Computer Science. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-4878-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Ameen, Mahdi Nasrullah, Kanis Fatema, Matthew Wright, and Shannon Scielzo. "Leveraging Real-Life Facts to Make Random Passwords More Memorable." In Computer Security -- ESORICS 2015. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24177-7_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matelski, Sławomir. "Secure Human Identification Protocol with Human-Computable Passwords." In Information Security Practice and Experience. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21280-2_25.

Full text
Abstract:
AbstractIn this paper we present a new method of secure human-computer identification, which remains safe also in untrusted systems and environments. This method allows the elimination of any supplementary gadgets/devices or theft-sensitive biometric data used by the Multi-Factor Authentication (MFA), and using only one secret as a universal private key for all obtainable online accounts. However, the features of this solution make it best suited for use by the Authentication Authority with the Single-Sign-On (SSO) method of identity and access management, rather than for individual services.
APA, Harvard, Vancouver, ISO, and other styles
6

Fandakly, Thaier, and Nicholas Caporusso. "Beyond Passwords: Enforcing Username Security as the First Line of Defense." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20488-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Yongge. "Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bonneau, Joseph. "Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords." In Security Protocols XIX. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25867-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kwon, Jeong Ok, Kouichi Sakurai, and Dong Hoon Lee. "Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks." In Computational Science – ICCS 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11758501_152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

El-Taj, Homam, Reema Albuluwi, Lulua Alshumesi, Lamar Miralam, Rania Alammari, and Hagar Amer. "Through the Lens: A Deep Dive into IP Camera Security and Privacy Challenges." In Proceedings in Technology Transfer. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-8588-9_12.

Full text
Abstract:
Abstract Internet of Things (IoT) technology is rapidly developing and really has revolutionized different aspects of life with tremendous development. The technology is fast-growing and integrates the use of IP cameras in modern surveillance systems to enhance security and monitoring functions. However, such increased connectivity brings significant security and privacy challenges because, in fact, IP cameras are the targets of various cyber threats—from unauthorized access to data compromise and even surveillance activities—risking personal privacy up to national security. Such challenges re
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Life; Password"

1

Hayashi, Eiji, and Jason Hong. "A diary study of password usage in daily life." In the 2011 annual conference. ACM Press, 2011. http://dx.doi.org/10.1145/1978942.1979326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rekha, N. Rukma, Y. V. Subba Rao, and K. V. S. S. R. S. S. Sarma. "Enhanced Key Life in Online Authentication Systems Using Virtual Password." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

K, Malar, Nayan Kumar S, Ravi N, Rohith Kumar G M, and Yuva Kishor T M. "Eye blink Password Based Secure Authentication." In International Conference on Recent Trends in Computing & Communication Technologies (ICRCCT’2K24). International Journal of Advanced Trends in Engineering and Management, 2024. http://dx.doi.org/10.59544/yrww2570/icrcct24p3.

Full text
Abstract:
An eye blink password based secure authentication system utilizes the unique biometric patterns found in the human eye, particularly the iris or retina, to verify an individual’s identity. This technology capitalizes on the distinct and stable nature of eye biometrics, making it highly secure and reliable. The system involves capturing high resolution images of the iris or retina, extracting unique features, and matching them against a stored database for authentication. Due to its accuracy, it is ideal for high security applications where traditional methods like passwords may fall short. Int
APA, Harvard, Vancouver, ISO, and other styles
4

Camacho, Giovanna, Matthew Bolton, Jingan Peng, and Prashanth Wagle. "A Formal Method for the Analysis of the Veteran’s Ebenefits’ Website." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003779.

Full text
Abstract:
Currently, the Ebenefits/VA.gov website has login problems. This is a serious situation because it prevents veterans from accessing critical services: applying for medical disabilities; enrolling in health care services; accessing educational benefits; managing current VA benefits; acquiring home and auto loans, life insurance, burial services; and connecting veteran networks for other community resources. When a service member is unable to access this website, they are unable to help themselves. This adds inefficiencies to the overall VA system and could lead to poor veteran integration to ci
APA, Harvard, Vancouver, ISO, and other styles
5

Tripathi, Santosh K., Swati Maurya, Ajeet Kumar, Koshtubh S. Raj, and Rajneesh Rawat. "IOT-BASED SMART ENERGY METER READING AND BILLING SYSTEM." In Computing for Sustainable Innovation: Shaping Tomorrow’s World. Innovative Research Publication, 2024. http://dx.doi.org/10.55524/csistw.2024.12.1.61.

Full text
Abstract:
There has been rapid progress towards the development of smart cities in the recent past. A smart city is an urban area that uses advanced technology for efficient monitoring and managing of resources- with an aim of improving the quality of life of its residents, and also optimizing the cost and energy requirements. Focusing on energy related monitoring, the basic component which serves as the foundation for all data collection, analysis and automation is a smart energy meter. This paper takes a conventional energy meter and with few modifications like Arduino and GSM module added to it conve
APA, Harvard, Vancouver, ISO, and other styles
6

Woo, Simon, Elsi Kaiser, Ron Artstein, and Jelena Mirkovic. "Life-experience passwords (LEPs)." In ACSAC '16: 2016 Annual Computer Security Applications Conference. ACM, 2016. http://dx.doi.org/10.1145/2991079.2991107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Radescu, Radu, and Sever Pasca. "ENHANCING THE SECURITY LEVEL OF THE NEW VERSION OF THE EASY-LEARNING ONLINE PLATFORM." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-108.

Full text
Abstract:
The Easy-Learning platform is a system of online education developed as an original product of the Department of Applied Electronics and Information Engineering from the University Politehnica of Bucharest. The platform has undergone many changes over the years, from a simple project and becoming a complex and efficient work in virtual learning environment. At this time, the platform has achieved a high degree of maturity, obtained using Symfony's framework, which simplifies many repetitive tasks, enables automatic generation entities and networking with other technologies currently used. To d
APA, Harvard, Vancouver, ISO, and other styles
8

Ravichandran, Lavanya, Aditya Vadlamani, Revathy Kt, and Prabhakar Tadinada. "Moving An Institute Online - Challenges and Experiences." In Tenth Pan-Commonwealth Forum on Open Learning. Commonwealth of Learning, 2022. http://dx.doi.org/10.56059/pcf10.1245.

Full text
Abstract:
This paper covers issues in moving an Institute of 10,000 students and faculty online and managing the services. Here are some of the processes and innovations we set up to achieve this: Laptops and internet connections were arranged for needy students through Alumni donations. A Help Desk operated from 800am to 1200 midnight. The highest call load was observed at the beginning of the semester and during exams. Typical problems were ‘password not working’ and ‘not able to take the exam due to connection problems’. Faculty were trained on pedagogical issues in online teaching, and best practice
APA, Harvard, Vancouver, ISO, and other styles
9

Yuichi Kobayashi, Toshiyuki Kuwana, Yoji Taniguchi, and Norihisa Komoda. "Group management system of RFID passwords for item life cycle." In 2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007). IEEE, 2007. http://dx.doi.org/10.1109/efta.2007.4416873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Suga, Yuji. "An Extended Lamport-Like One-Time Password Scheme and its Applications." In 2018 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia). IEEE, 2018. http://dx.doi.org/10.1109/icce-asia.2018.8552134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!