To see the other types of publications on this topic, follow the link: Login.

Journal articles on the topic 'Login'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Login.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Salmasian, Hojjat, David Rubins, and David W. Bates. "Using the Electronic Health Record User Context in Clinical Decision Support Criteria." Applied Clinical Informatics 13, no. 04 (August 2022): 910–15. http://dx.doi.org/10.1055/s-0042-1756426.

Full text
Abstract:
Abstract Background Computerized clinical decision support (CDS) used in electronic health record systems (EHRs) has led to positive outcomes as well as unintended consequences, such as alert fatigue. Characteristics of the EHR session can be used to restrict CDS tools and increase their relevance, but implications of this approach are not rigorously studied. Objectives To assess the utility of using “login location” of EHR users—that is, the location they chose on the login screen—as a variable in the CDS logic. Methods We measured concordance between user's login location and the location of the patients they placed orders for and conducted stratified analyses by user groups. We also estimated how often login location data may be stale or inaccurate. Results One in five CDS alerts incorporated the EHR users' login location into their logic. Analysis of nearly 2 million orders placed by nearly 8,000 users showed that concordance between login location and patient location was high for nurses, nurse practitioners, and physician assistance (all >95%), but lower for fellows (77%) and residents (55%). When providers switched between patients in the EHR, they usually did not update their login location accordingly. Conclusion CDS alerts commonly incorporate user's login location into their logic. User's login location is often the same as the location of the patient the user is providing care for, but substantial discordance can be observed for certain user groups. While this may provide additional information that could be useful to the CDS logic, a substantial amount of discordance happened in specific user groups or when users appeared not to change their login location across different sessions. Those who design CDS alerts should consider a data-driven approach to evaluate the appropriateness of login location for each use case.
APA, Harvard, Vancouver, ISO, and other styles
2

Schmeller, Rebecca. "In Strategy Simulations, Data Analysis Matters Most (More Than Number of Log Ins and More Than Time Spent Logged In)." Simulation & Gaming 50, no. 1 (January 9, 2019): 62–75. http://dx.doi.org/10.1177/1046878118821402.

Full text
Abstract:
Background. This data study examined the predictive power of student login activities (frequency, duration, opening reports) on simulation performance (seven Assurance of Learning scores), using Glo-Bus strategy simulation. Methods. The study used a sample of 351 students at a small, private Ohio university over four academic years (fall 2013 through spring 2017) to conduct regression analysis of three predictor variables (login data about reports, frequency, duration) and seven outcome variables (Assurance of Learning scores for finance, operations, marketing, HR, CSR, leadership, collaboration). Results. Opening reports was found to be more predictive of simulation performance than the other two login variables (frequency of logins, duration of logins). Discussion. In the literature, there were studies about strategy simulation login activity, but they did not address how Glo-Bus login activity types were related to Assurance of Learning scores. Some studies about strategy simulations called for more narrowly defined objectives and student accountability. This study supported that call – revealing that opening reports was more predictive of Assurance of Learning scores – suggesting students be held accountable for opening reports. Conclusions and Recommendations. Because this study found opening reports to be more predictive than other login activity, the software designers should promote report opening by making it a more direct and immediate aspect of the software and by including report analysis skills in the embedded quizzes. Additionally, instructor materials should include guidance on how to teach report use to Glo-Bus simulation students.
APA, Harvard, Vancouver, ISO, and other styles
3

Aït-Kaci, Hassan, and Roger Nasr. "Login: a logic programming language with built-in inheritance." Journal of Logic Programming 3, no. 3 (October 1986): 185–215. http://dx.doi.org/10.1016/0743-1066(86)90013-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Malone, S. "Logout and Login." Seismological Research Letters 73, no. 4 (July 1, 2002): 518–19. http://dx.doi.org/10.1785/gssrl.73.4.518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ingle, Darshan, Varsha Patil, and Sanjay Talbat. "Password-Free Login." International Journal of Computer Applications 87, no. 17 (February 14, 2014): 26–30. http://dx.doi.org/10.5120/15301-4035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jackson, Corey Brian, Kevin Crowston, and Carsten Østerlund. "Did they login?" Proceedings of the ACM on Human-Computer Interaction 2, CSCW (November 2018): 1–16. http://dx.doi.org/10.1145/3274346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raajan, N. R., G. Shiva, P. V. M. Vijayabhas, P. Mithun, and J. Peter Raj. "Secured Login System." Research Journal of Information Technology 5, no. 3 (March 1, 2013): 462–67. http://dx.doi.org/10.3923/rjit.2013.462.467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Utami, Hamdan Dian Jaya Rozi Hyang, Riza Arifudin, and Alamsyah Alamsyah. "Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit." Scientific Journal of Informatics 6, no. 1 (May 24, 2019): 34–44. http://dx.doi.org/10.15294/sji.v6i1.17589.

Full text
Abstract:
The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system. A login system that used the database as user authentication and passwords are very vulnerable to be hacking. In securing data, various ways had been developed including cryptography. Cryptographic algorithms used in securing passwords usually used MD5 encryption. However, MD5 as a broader encryption technique is very risky. Therefore, the level of login system security in an android application is needed to embed the Advanced Encryption Standard (AES) algorithm in its process. The AES algorithm was applied using variations of 3 keys 128-bit, 192-bit, and 256-bit. Security level testing was also conducted by using 40 SQL Injection samples which the system logins without security obtained 27.5% that be able to enter the system compared to the result of login systems that use AES algorithm 128-bit, 192-bit or 256-bit was obtained 100% that cannot enter into the system. The estimation of the average encryption process of AES 128, 192 and 256 bits are 5.8 seconds, 7.74 seconds, and 9.46 seconds.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Wenzhe, Chuyang Zeng, Yang Cao, Zuming Qin, and Haiguang Chen. "An abnormal user login behavior detection method of industrial control system based on multi-dimensional probability analysis." Journal of Physics: Conference Series 2246, no. 1 (April 1, 2022): 012082. http://dx.doi.org/10.1088/1742-6596/2246/1/012082.

Full text
Abstract:
Abstract Aiming at the poor detection performance of user abnormal login behavior in the complex environment of industrial control system, a new method based on multi-dimensional probability analysis is proposed. First of all, login time, source, destination and other login parameters are collected. Secondly, the abnormal probability of login parameters is calculated. Thirdly, the login transfer probability among multiple destination hosts is calculated. Finally, through the comprehensive analysis of the above three probabilities, an abnormal login behavior detection model based on multi-dimensional probability analysis is constructed. Experiments show that this method can effectively identify the abnormal login behavior of users caused by various types of network attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Aini, Qurotul, Untung Rahardja, and Romzi Syauqi Naufal. "Penerapan Single Sign On dengan Google pada Website berbasis YII Framework." SISFOTENIKA 8, no. 1 (January 10, 2018): 57. http://dx.doi.org/10.30700/jst.v8i1.161.

Full text
Abstract:
<p>Era globalisasi yang membuat perkembangan teknologi sangat pesat memberikan pengaruh sangat besar bagi manusia setiap bidang kehidupan. Website pastinya akan membuat sebuah perubahan dari era yang manualisasi ke era yang pastinya lebih komputerisasi dalam berbagai bidang pendidikan. Pengaksesan Website secara komputerisasi yang dilalui tahap awal adalah login dengan mudah pada<br />website. Aktifitas login yang sering menggunakan username dan password sebuah email google yang terkadang berbeda – beda. Kesulitan untuk login jika seorang pengguna login yang berbeda-beda untuk setiap sistem yang digunakan, karena seseorang harus dapat mengingat banyak username dan password yang juga keamanan harus dijaga dengan baik. Single Sign On ( SSO ) with google<br />merupakan fasilitas yang memberikan kemudahan untuk user yang melakukan login ketika menjelajah di internet. Dengan metode Single Sign On ( SSO ) with google ini, setiap user hanya perlu memiliki satu account Gmail untuk login. User hanya perlu login satu kali saja agar menggunakan semua fasilitas yang ada di website utama PenA (Penilaian Absensi). Disimpulkan dengan SSO with google<br />dalam system dapat mempermudah aktifitas satu kali Login dan menangani authentifikasi.<br />Kata kunci— Single Sign On with Google, Login dan Website.</p>
APA, Harvard, Vancouver, ISO, and other styles
11

Gafni, Ruti, and Dudu Nissim. "To Social Login or not Login? Exploring Factors Affecting the Decision." Issues in Informing Science and Information Technology 11 (2014): 057–72. http://dx.doi.org/10.28945/1980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Syahir, Ahmad, and Chuah Chai Wen. "Secure Login Mechanism for Online Banking." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 179. http://dx.doi.org/10.30630/joiv.2.3-2.136.

Full text
Abstract:
Login is one of the important security features in online banking. This research investigates the mechanism for an existing online banking in Malaysia including the design of the login mechanism, the encryption algorithm used for the password and the security level of the login mechanism. This research provides a result of analyzing data between five online banking in terms of their security features. These analyzing data will be used for proposing secure password encryption in online banking. The mathematic is used to evaluate the security level for these secure login applications. Output from the mathematical analysis is the probability that the adversary may break the security of login application.
APA, Harvard, Vancouver, ISO, and other styles
13

Bagul, Yogita. "Secured Login with Networking." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (March 31, 2018): 3313–15. http://dx.doi.org/10.22214/ijraset.2018.3703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Nugraha, Muhammad Adi, Desi Arisandi, and Novario Jaya Perdana. "PENGAMANAN WEBSITE E-COMMERCE MENGGUNAKAN MULTI-FACTOR AUTHENTICATION." Jurnal Ilmu Komputer dan Sistem Informasi 9, no. 1 (January 18, 2021): 158. http://dx.doi.org/10.24912/jiksi.v9i1.11588.

Full text
Abstract:
Data security is very important and privacy for every user because there is sensitive information so it must be safe from irresponsible parties. One method that can secure user account data is Multi-Factor Authentication. E-commerce applications using Multi-Factor Authentication can secure their user accounts. This discussion is about creating website-based e-commerce applications that users can use to buy smart phone products. This E-commerce website application can secure users through 3 login steps. The login mechanism presented in this e-commerce website application is login with password, login with OTP code, and finally login with personal questions. The experimental results show that using the multi-factor authentication method provides good security for user accounts
APA, Harvard, Vancouver, ISO, and other styles
15

Sarumi, Jerry Abayomi. "Network Security Based On Two-Factor Authentication System." Advances in Multidisciplinary and scientific Research Journal Publication 9, no. 2 (June 30, 2021): 1–14. http://dx.doi.org/10.22624/aims/maths/v9n2p1.

Full text
Abstract:
The paper examined the network security based on a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of people. Faced with the challenges of poor security and vulnerability of users, resulting to applications being hacked by unauthorized people, this research delved into developing a more secured login application that sends a secret pass code to the registered phone number of a user for identification purpose. The aim of the application is basically to ensure that users are safe, and all logins are authorized. The application was developed with PHP, MYSQL, CSS, BOOTSTRAP, HTML technologies and WAMP Server. Keywords: Geno-generative, database, sensor, swarm, Top-k
APA, Harvard, Vancouver, ISO, and other styles
16

ZHENG, DONGXI, SHAOHUA TANG, and SHAOFA LI. "WEB SERVICES SINGLE SIGN-ON PROTOCOL AND FORMAL ANALYSIS ON IT." Journal of Circuits, Systems and Computers 14, no. 05 (October 2005): 923–30. http://dx.doi.org/10.1142/s0218126605002714.

Full text
Abstract:
Web Services technology is suitable for cross-platform and cross-application integration. To secure systems based on Web Services, a single sign-on protocol for Web Services supporting several login modes are presented. The architecture and the formalized flow of the protocol are described. The protocol is also analyzed and proven using an extended SVO logic.
APA, Harvard, Vancouver, ISO, and other styles
17

Riadi, Imam, Herman, and Aulyah Zakilah Ifani. "Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain." JISKA (Jurnal Informatika Sunan Kalijaga) 6, no. 3 (September 22, 2021): 139–48. http://dx.doi.org/10.14421/jiska.2021.6.3.139-148.

Full text
Abstract:
The aspect of the internet that needs to be considered a security is the login system. The login system usually uses a username and password as an authentication method because it is easy to implement. However, data in the form of usernames and passwords are very vulnerable to theft, so it is necessary to increase the security of the login system. The purpose of this research is to investigate the security of the system. Whether the system is good at protecting user data or not, minimizing execution errors from the system and minimizing risk errors on the system so that the login system can be used safely. This research is conducted to test the system security with Burp Suite on the login system that has been built. Testing the security of this system by experimenting with POST data which is secured using blockchain technology makes the data sent in the form of hash blocks safer and more confidential so that the system is safer than before. Blockchain technology has successfully secured usernames and passwords from broken authentication attacks. By using the Burp Suite testing system, login is more specific in conducting security testing.
APA, Harvard, Vancouver, ISO, and other styles
18

Plavsic, Vera, and Emil Secerov. "Modeling of login procedure for wireless application with interaction overview diagrams." Computer Science and Information Systems 5, no. 1 (2008): 87–108. http://dx.doi.org/10.2298/csis0801087p.

Full text
Abstract:
In this paper we describe in details UML modeling of login procedure, which is a part of UserBarCodeReader application, developed for large stores and intended for use as a customer support during the shopping session. Login procedure is realized within access control system, in this case over a wireless network. Paper gives the whole modeling and implementation cycle of login procedure, from Use Case diagrams to the Java source code. Login procedure is modeled using interaction overview diagram, new in UML 2.0 which gives concise representation and divides complex sequence diagram into several smaller. The link between these diagrams is modeled with OCL postcondition and precondition expressions.
APA, Harvard, Vancouver, ISO, and other styles
19

Listartha, I. Made Edy. "AUTOMASI WEBSITE BROWSER UNTUK MELAKUKAN AUTOLOGIN KE DALAM CAPTIVE PORTAL." Jurnal Ilmiah Informatika Komputer 25, no. 2 (2020): 98–106. http://dx.doi.org/10.35760/ik.2020.v25i2.2766.

Full text
Abstract:
Penggunaan captive portal dalam sekuriti jaringan komputer menuntut pengguna untuk selalu melakukan registasi pada halaman hotspot saat diperlukan. Penelitian ini menanfaatkan website browser lynx berbasis teks sebagai sarana untuk melakukan registrasi pada captive portal yang di automasi dengan script yang berisi username dan password pengguna. Perangkat penelitiannya sendiri menggunakan software simulasi yang menjalankan RouterOS mikrotik dan linux sebagai pengguna. Mikrotik dibangun sebagai captive portal dengan menggunaan setup wizard dengan konfigurasi IP 192.168.200.1/24, menjalankan fungsi DHCP Server pada sebuah interface1 yang terhubung langsung dengan OS Linux pengguna sehingga mendapatkan IP melalui DHCP Client. Halaman captive portal terbentuk pada alamat http://test.mikrotik.local dengan tampilan standar. Perekaman proses login melalui browser lynx dilakukan untuk mendapatkan script proses login dan digunakan untuk proses automasi login. Pengujian dilakukan dengan menjalankan perintah cmd_script berisi rekaman proses login dan menghapus sesi login pada mikrotik setelah berhasil untuk pengujian selanjutnya. Pengujian dilakukan sebanyak 20 kali dengan hasil tanpa adanya kegagalan jika tidak terdapat gangguan oleh pengguna maupun sistem saat proses automasi berjalan.
APA, Harvard, Vancouver, ISO, and other styles
20

Li, Hai Jun. "The Page Flow Implements Business Logic in Web Applications." Applied Mechanics and Materials 347-350 (August 2013): 2536–40. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2536.

Full text
Abstract:
This paper discusses the application of the technology of NetUI flow page in the business logic of Web applications. The page flow uses declarative programming method, and has session state and modular design, which can be nested to use and effectively separate the logical code in the Web applications, to make the application structure clear, easy to be read and modified. The paper references a business logic of the users login authentication to illustrate the implementation process of the entire page flow.
APA, Harvard, Vancouver, ISO, and other styles
21

Herzberg, Amir, and Ronen Margulies. "Forcing Johnny to login safely." Journal of Computer Security 21, no. 3 (July 12, 2013): 393–424. http://dx.doi.org/10.3233/jcs-130467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Perković, Toni, Mario Čagalj, and Nikola Rakić. "SSSL: Shoulder Surfing Safe Login." Journal of Communications Software and Systems 6, no. 2 (June 22, 2010): 65. http://dx.doi.org/10.24138/jcomss.v6i2.191.

Full text
Abstract:
Classical PIN-entry methods are vulnerable to a broad class of observation attacks (shoulder surfing, key-logging).A number of alternative PIN-entry methods that are based on human cognitive skills have been proposed. These methods can be classified into two classes regarding information available to a passive adversary: (i) the adversary fully observes the entire input and output of a PIN-entry procedure, and (ii) the adversary can only partially observe the input and/or output. In this paper we propose a novel PIN-entry scheme - Shoulder Surfing Safe Login (SSSL). SSSL is a challenge response protocol that allows a user to login securely in the presence of the adversary who can observe (via key-loggers, cameras) user input. This is accomplished by restricting the access to SSSL challenge values. Compared to existing solutions, SSSL is both user-friendly (not mentally demanding) and cost efficient. Our usability study reveals that the average login time with SSSL is around 8 sec in a 5-digit PIN scenario. We also show the importance of considering side-channel timing attacks in the context of authentication schemes based on human cognitive skills.
APA, Harvard, Vancouver, ISO, and other styles
23

Hilmi, Futuh, Rumani Mangkudjaja, and Budhi Irawan. "Analisis Performansi Autentikasi Single Sign On pada Web Menggunakan LDAP." Jurnal SIFO Mikroskil 13, no. 2 (October 20, 2012): 93–102. http://dx.doi.org/10.55601/jsm.v13i2.74.

Full text
Abstract:
Identifikasi yang sering ditemui adalah dalam bentuk login yang menggunakan username dan password. Disini akan timbul kesulitan untuk mengelola login tersebut jika seorang pengguna memiliki??? login yang berbeda-beda untuk setiap sistem aplikasi, karena dengan demikian seseorang harus dapat mengingat banyak username dan password. Single Sign-On ( SSO ) merupakan fasilitas yang memberikan kemudahan untuk user yang melakukan login ketika menjelajah di internet. Dengan menggunakan metode SSO ini, setiap user hanya perlu memiliki satu username, dan satu password. User hanya perlu login satu kali saja agar dapat menggunakan semua fasilitas yang ada di web utama. User tidak perlu mengingat banyak account, dan tidak perlu berulang kali melakukan login. Hal ini juga dapat mempermudah dalam pengorganisasian data user yang ada, karena menggunakan tempat penyimpanan data user yang terpusat. CAS digunakan untuk menangani masalah komunikasi antara web. LDAP digunakan sebagai sebuah protokol layanan direktori , dimana semua data user disimpan di dalam LDAP. Dari hasil analisa performansi single sign on pada web, diperoleh nilai response time server sebesar 0.90 second, dan dalam 1 detik server mampu melayani 110 request dari user. Fasilitas ini dapat melayani hingga 500 user yang melakukan request secara bersamaan dalam satu waktu kepada server single sign on. Hal ini dikarenakan respon error server ketika melayani 500 user bernilai nol. Waktu tercepat server dalam melayani user adalah 191 ms dan waktu terlama dalam melayani user adalah 11864 ms.
APA, Harvard, Vancouver, ISO, and other styles
24

Jia, Li. "Unified Login Authentication Method Based on Cloud Computing." Advanced Materials Research 926-930 (May 2014): 2245–48. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2245.

Full text
Abstract:
According to the single sign-on authentication mode, cloud computing unified login authentication method was put forward, and point set topology changing method was used for generating fractal random key, improved login authentication safety grade. Firstly, analyzed cloud computing login authentication system structure, and then used network public databases of fingerprint image as an example do fractal changes ring operation, generated a pseudo-random sequence, then the sequence encrypted and sent to the server for authentication through UDP. Lastly, made a simulation example.
APA, Harvard, Vancouver, ISO, and other styles
25

Yang, Yu Jing. "The Design of Unified Identity Authentication and Single Point Login System." Applied Mechanics and Materials 155-156 (February 2012): 391–95. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.391.

Full text
Abstract:
The single point login and unified the identity authentication of the existing schemes of further research, realize the campus network based on single point login and unified SAML(Security Assertion Markup Language)identity authentication system. Digital campus requirements before the application of various independent integration system, so first must undertake unity identity authentication, such, users in the visit of the campus network resources and application system, just log on a campus network, can be achieved in the user rights within the entire network roaming and avoid a repeat of the user login and information redundancy.
APA, Harvard, Vancouver, ISO, and other styles
26

Winata, Yuki Indragiri, Hermawaty Hermawaty, and Muh Mujib. "Data Format and Interface Design in Digital Identity Applications Using WSO2." CCIT Journal 15, no. 1 (February 7, 2022): 17–25. http://dx.doi.org/10.33050/ccit.v15i1.1365.

Full text
Abstract:
This study aims to upgrade the application login system in STMIK "AMIKBANDUNG", from some problems that exist in a regular login system and with the development of an information system that requires STMIK "AMIKBANDUNG" to follow its development, not only various applications but companies are required to improve data security on the application login system. In the draft in this study proposes a single entry system (Single Sign On). By using this single login system, users only need to remember one user name and password to enter in various applications in the organization or company. In this study using open source WSO2 IS, and in the database system in WSO2 IS there is an embedded database system that is H2 database, in addition to H2 database, WSO2 IS provides a place for other database systems such as MYSQL. So in one identity provider this contains two database systems. And the results of the application of MYSQL database in this research allows WSO2 IS users to develop in various protocols in WSO2 IS, and use a simple and easy to understand interface format. So with this research, STMIK "AMIKBANDUNG" can upgrade the login system, with only one account can make it easier for students and staff to enter into one or more of the application services in STMIK "AMIKBANDUNG".
APA, Harvard, Vancouver, ISO, and other styles
27

Vanitha, K. "Secured Login Authentication on Key Attackers." International Journal for Research in Applied Science and Engineering Technology V, no. IV (April 30, 2017): 1381–83. http://dx.doi.org/10.22214/ijraset.2017.4247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Dutta, Shreya, Shalu Singh, and Pratiksha Ghodke. "Secure Login System Using QR-Image." International Journal of Computer Applications Technology and Research 8, no. 1 (January 1, 2019): 1–3. http://dx.doi.org/10.7753/ijcatr0801.1001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

., Bhavana M. Bahikar. "ADAPTING SINGLET LOGIN IN DISTRIBUTED SYSTEMS." International Journal of Research in Engineering and Technology 03, no. 02 (February 25, 2014): 523–27. http://dx.doi.org/10.15623/ijret.2014.0302091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lim, Jung-Gun, Chang-Suk Choi, Tae-Eun Park, Hyo-Sun Ki, and Beongku An. "Android Based Mobile Combination Login Application." Journal of the Institute of Webcasting, Internet and Telecommunication 13, no. 3 (June 30, 2013): 151–56. http://dx.doi.org/10.7236/jiibc.2013.13.3.151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Han, Huiyi, Zhiyi Qu, and Weiwei Kang. "A LOGIN STRATEGY USING FINGERPRINT VERIFICATION." International Journal of Computer Science and Engineering 2, no. 7 (July 25, 2015): 1–5. http://dx.doi.org/10.14445/23488387/ijcse-v2i7p111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gritzalis, Dimitris, Sokratis Katsikas, and Stefanos Gritzalis. "A zero knowledge probabilistic login protocol." Computers & Security 11, no. 8 (December 1992): 733–45. http://dx.doi.org/10.1016/0167-4048(92)90129-f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Shapiro, J., S. Vaidya, G. Kuperman, and N. Genes. "Adoption of Health Information Exchange by Emergency Physicians at Three Urban Academic Medical Centers." Applied Clinical Informatics 02, no. 03 (2011): 263–69. http://dx.doi.org/10.4338/aci-2011-02-cr-0010.

Full text
Abstract:
Summary Objectives: Emergency physicians are trained to make decisions quickly and with limited patient information. Health Information Exchange (HIE) has the potential to improve emergency care by bringing relevant patient data from non-affiliated organizations to the bedside. NYCLIX (New York CLinical Information eXchange) offers HIE functionality among multiple New York metropolitan area provider organizations and has pilot users in several member emergency departments (EDs). Methods: We conducted semi-structured interviews at three participating EDs with emergency physicians trained to use NYCLIX. Among “users” with > 1 login, responses to questions regarding typical usage scenarios, successful retrieval of data, and areas for improving the interface were recorded. Among “non-users” with ≤1 login, questions about NYCLIX accessibility and utility were asked. Both groups were asked to recall items from prior training regarding data sources and availability. Results: Eighteen NYCLIX pilot users, all board certified emergency physicians, were interviewed. Of the 14 physicians with more than one login, half estimated successful retrieval of HIE data affecting patient care. Four non-users (one login or less) cited forgotten login information as a major reason for non-use. Though both groups made errors, users were more likely to recall true NYCLIX member sites and data elements than non-users. Improvements suggested as likely to facilitate usage included a single automated login to both the ED information system (EDIS) and HIE, and automatic notification of HIE data availability in the EDIS All respondents reported satisfaction with their training. Conclusions: Integrating HIE into existing ED workflows remains a challenge, though a substantial fraction of users report changes in management based on HIE data. Though interviewees believed their training was adequate, significant errors in their understanding of available NYCLIX data elements and participating sites persist.
APA, Harvard, Vancouver, ISO, and other styles
34

Putra, M. Gilvy Langgawan, Sadriansyah Sadriansyah, Ahmad Maulana Fikri, Hendy Maulana Jaya Saputra, Brianto Rovi Harjanto, and Dimas Saputra. "Pembuatan Aplikasi Sinkronisasi Data Akademik dengan Feeder PDDIKTI Berbasis Web Service." SPECTA Journal of Technology 5, no. 1 (April 1, 2021): 13–21. http://dx.doi.org/10.35718/specta.v4i3.248.

Full text
Abstract:
Setiap universitas ataupun Lembaga Pendidikan tinggi di Indonesia, termasuk Institut Teknologi Kalimantan wajib untuk memeperbarui informasi mengenai mahasiswa yang berkuliah. Untuk melakukan pembaruan informasi tersebut, Kementerian Riset, Teknologi, dan Pendidikan tinggi merilis aplikasi Feeder PDDIKTI untuk mempermudah administrasi pembaruan data mahasiswa. Institut Teknologi Kalimantan sebagai perguruan tinggi di Indonesia belum memiliki sistem basis data yang terintegrasi dengan Pangkalan Data Pendidikan Tinggi. Oleh karena itu, Dalam pengembangannya dilakukan dengan identifikasi masalah, studi literaur, analisis kebutuhan yang terdiri dari pembuatan use case diagram, Deskripsi use case, kebutuhan perangkat lunak, kebutuhan perangkat keras, kemudian tahapan desain dan arsitektur terdiri dari pemetaan data, proses data, struktur navigasi dan method web service. Selanjutnya dilakukan coding dan pengujian dengan black box, menghasilkan 2 fitur diujikan sukses.dibutuhkan perancangan dan installasi Feeder PDDIKTI. Hasil dari pengembangan aplikasi ini adalah berupa sistem informasi berbasi website dengan dua fitur, yakni fitur login dan fitur sinkronisasi. Fitur login memungkinkan pengguna untuk melakukan login, dan fitur sinkronisasi memungkinkan untuk memperbarui data atau menambahakan data pada Pangkalan Data Pendidikan Tinggi. Hasil pengujian terhadap fitur login dan fitur sinkronisasi adalah berhasil.
APA, Harvard, Vancouver, ISO, and other styles
35

Lombu, Dafirius, Siska Dame Tarihoran, and Irwan Gulo. "Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website." J-SAKTI (Jurnal Sains Komputer dan Informatika) 2, no. 1 (March 27, 2018): 1. http://dx.doi.org/10.30645/j-sakti.v2i1.51.

Full text
Abstract:
Generally, the database access of a website lies in the user login. When the login data is not accompanied by security techniques, it is very easily accessible by other parties. One effort that can be done to solve the problem is to encode the login data of website users based on cryptographic technique algorithm. Triangle Chain Cipher (TCC) is one of the classic cryptographic algorithms that encode data doubly and generate keys randomly along the plain. The process of encryption and decryption are interdependent to be one of the advantages of this algorithm. This algorithm will be more effective when combined with the Cipher Block Chaining (CBC) operation mode that is widely used in modern cryptographic algorithms today. The feedback mechanism between the blocks in this mode of operation is the operating advantage. This study describes how to combine the mode of operation of block chaining cipher with triangle chain cipher algorithm so that cipher data login website generated more random and difficult to find its original meaning.
APA, Harvard, Vancouver, ISO, and other styles
36

Mozahem, Najib Ali. "Using Learning Management System Activity Data to Predict Student Performance in Face-to-Face Courses." International Journal of Mobile and Blended Learning 12, no. 3 (July 2020): 20–31. http://dx.doi.org/10.4018/ijmbl.2020070102.

Full text
Abstract:
Higher education institutes are increasingly turning their attention to web-based learning management systems. The purpose of this study is to investigate whether data collected from LMS can be used to predict student performance in classrooms that use LMS to supplement face-to-face teaching. Data was collected from eight courses spread across two semesters at a private university in Lebanon. Event history analysis was used to investigate whether the probability of logging in was related to the gender and grade of the students. Results indicate that students with higher grades login more frequently to the LMS, that females login more frequently than males, and that student login activity increases as the semester progresses. As a result, this study shows that login activity can be used to predict the academic performance of students. These findings suggest that educators in traditional face-to-face classes can benefit from educational data mining techniques that are applied to the data collected by learning management systems in order to monitor student performance.
APA, Harvard, Vancouver, ISO, and other styles
37

Pho, Kelvin Ky-Minh, Rong Lu, Samantha Gates, Jennifer Cai, Donglu Xie, Yang Xie, Simon Craddock Lee, and David E. Gerber. "Mobile device access to electronic patient portals in oncology: Potential implications for patient and practice experiences." Journal of Clinical Oncology 36, no. 30_suppl (October 20, 2018): 179. http://dx.doi.org/10.1200/jco.2018.36.30_suppl.179.

Full text
Abstract:
179 Background: Mobile devices provide individuals with rapid and frequent access to electronic patient portals. How patients use this growing and widespread technology to review test results and communicate with providers is not known. Methods: Retrospective study of patients enrolled in the MyChart electronic health portal associated with the EPIC electronic medical record in the Harold C. Simmons Comprehensive Cancer Center. We recorded type of portal access according to year and patient characteristics. Associations between patient characteristics and type of portal access were tested using Mann-Whitney test, Chi-square test, and linear Gaussian regression models. Results: Since the availability of mobile access in 2012, 2,524 patients accessed MyChart from a mobile device at least once, accounting for 291,526 mobile logins. The proportion of patients with mobile MyChart logins increased from 4% in 2012 to 13% in 2017 ( P= 0.004). Among these patients, the proportion of logins from mobile devices increased from 22% to 72% ( P< 0.001). Mobile access occurred more frequently among younger ( P< 0.001), black ( P= 0.002), and Hispanic ( P= 0.004) patients. In 2017, among patients who accessed MyChart from mobile devices at least once, those under age 40 years used the mobile application for over 90% of logins; those over age 60 years used the mobile application for 65% of logins. Black and Hispanic patients who used mobile MyChart access did so for approximately 80% of logins, compared to 70% of logins for non-Hispanic white patients. Before 2012, patients who went on to use mobile access averaged about five more logins per year than did mobile application never-users. While login frequency increased for both groups, the change was far greater for mobile application users. After 2012, total portal login frequency increased approximately 110% among patients who used mobile access, compared to 25% among non-users ( P< 0.001). Conclusions: Mobile access to electronic health portals has increased patient portal use, particularly among traditionally underserved populations. How this widely and immediately available technology impacts patient and practice experiences warrants further study.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Shu Guang, and Qiao Yun Sun. "User Passwords Sniffing and Defense in LANs." Applied Mechanics and Materials 427-429 (September 2013): 2728–31. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2728.

Full text
Abstract:
In this paper, the network security of LANs and the data sniffing theory is discussed. The sniffing and intercepting process of FTP and Telnet login usernames and passwords is described. Its not safe to transmit data in a network without encrypting any data. In order to keep important information safe, it is necessary to encrypt those important data before transmission, especially login usernames and passwords. SSH is a secure protocol used to make up for the defect of traditional TCP/IP protocols. By using SSH, the important messages such as login usernames and passwords can be encrypted. It is very difficult for a network attacker to retrieve the important messages even if he has captured those encrypted messages.
APA, Harvard, Vancouver, ISO, and other styles
39

Mulyanto, Yudi, and Akbar Algi Fari. "ANALISIS KEAMANAN LOGIN ROUTER MIKROTIK DARI SERANGAN BRUTEFORCE MENGGUNAKAN METODE PENETRATION TESTING (Studi Kasus: SMK NEGERI 2 SUMBAWA)." Jurnal Informatika, Teknologi dan Sains 4, no. 3 (August 2, 2022): 145–55. http://dx.doi.org/10.51401/jinteks.v4i3.1897.

Full text
Abstract:
Perkembangan teknologi jaringan dari waktu ke waktu semakin pesat, oleh karena itu diperlukan akses jaringan yang aman atau secure. Dengan banyaknya akses ke jaringan, maka akan banyak pula peluang terjadinya kejahatan di dalam jaringan tersebut. Penelitian ini menggunakan metode penetration testing yang bertujuan untuk menganalisis celah keamanan pada login dari router Mikrotik di SMKN 2 Sumbawa. Dalam melakukan trial attack, penelitian ini menggunakan Brute Force. Hasil penelitian ditemukan lubang keamanan pada halaman login Router Mikrotik yang dapat diserang menggunakan Brute Force, terbukti dengan mendapatkan username dan password login dari Router Mikrotik. Hasil akhir dari penelitian ini memberikan solusi bagaimana mencegah serangan Brute Force untuk menjadi pertimbangan bagi admin Jaringan dalam mengamankan Router.
APA, Harvard, Vancouver, ISO, and other styles
40

Yu, Hai Bo. "Internet Aided Teaching System Design and Implementation." Advanced Materials Research 1044-1045 (October 2014): 1615–18. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1615.

Full text
Abstract:
Online teaching assistant system is geared to the needs of teachers and students of secondary system, contains the user operation modules: ordinary user login; Students submit assignments, view the courseware, put forward questions and online; Teachers' release courseware, corrects students' papers, update the examination paper, answer questions, etc; Also contains the administrator operation modules: administrator login, maintenance, and other functions.
APA, Harvard, Vancouver, ISO, and other styles
41

Sujana Eka Putra, I. Gede, and Ni Luh Putu Labasariyani. "Design and Development of Login Security System Using Radio Frequency Identification." Logic : Jurnal Rancang Bangun dan Teknologi 19, no. 1 (March 30, 2019): 41. http://dx.doi.org/10.31940/logic.v19i1.1301.

Full text
Abstract:
System security is important in information systems to prevent unauthorized users from accessing data. Login system applies security using encrypted passwords stored on RFID cards. This research designed login security system storing encrypted password using MD5 encryption into the Mifare Tag RFID card and equipped NFC reader to read data from RFID Card. By storing encrypted password characters on RFID cards, login system security is stronger and cannot be traced by unauthorized parties to log into systems. Some stage of system design are through study of literature, designing process flow, system algorithms, designing encryption methods and system interfaces, writing card module coding, card reading module coding, implementation, and system testing. The system login applied by scanning RFID card on the NFC reader, if the password on RFID matches then the user successfully logs into the system. Based on the testing of RFID Tag readings, the maximum distance from the reading of RFID Tag cards is up to 7 cm with a reading range of 00 to 300 with a success rate of 100% authentication. By using RFID Tag cards, increase security for logging into the system, because user cannot log in without having a card with the appropriate password.
APA, Harvard, Vancouver, ISO, and other styles
42

Abraham Kalloor, Eric, Dr Manoj Kumar Mishra, and Prof Joy Paulose. "Phishfort – Anti-Phishing Framework." International Journal of Engineering & Technology 7, no. 3.4 (June 25, 2018): 42. http://dx.doi.org/10.14419/ijet.v7i3.4.14673.

Full text
Abstract:
Phishing attack is one of the most common form of attack used to get unauthorized access to users’ credentials or any other sensitive information. It is classified under social engineering attack, which means it is not a technical vulnerability. The attacker exploits the human nature to make mistake by fooling the user to think that a given web page is genuine and submitting confidential data into an embedded form, which is harvested by the attacker. A phishing page is often an exact replica of the legitimate page, the only noticeable difference is the URL. Normal users do not pay close attention to the URL every time, hence they are exploited by the attacker. This paper suggests a login framework which can be used independently or along with a browser extension which will act as a line of defense against such phishing attacks. The semi-automated login mechanism suggested in this paper eliminates the need for the user to be alert at all time, and it also provides a personalized login screen so that the user can to distinguish between a genuine and fake login page quite easily.
APA, Harvard, Vancouver, ISO, and other styles
43

S.Kom, M.T.I, Khanna Tiara, Fella Megita Putri, and Heni Triyani. "Optimalisasi Single Sign On Untuk Meningkatkan Sistem Keamanan OJRS+." Technomedia Journal 1, no. 2 (March 1, 2017): 61–75. http://dx.doi.org/10.33050/tmj.v1i2.50.

Full text
Abstract:
Seiring perkembangan zaman dan juga teknologi yang semakin cepat, Perguruan Tinggi Raharja merupakan kampus yang memanfaatkan jaringan internet sebagai komunikasi antar Dosen dan Mahasiswa untuk kepentingan akademis. Perguruan Tinggi Raharja saat ini sedang berusaha membuat riset dalam membangun pengembangan secara terus menerus. Dalam Perguruan Tinggi Raharja terdapat suatu website yang khusus diperuntukan untuk melakukan batal tambah secara online, website tersebut merupakan OJRS+ (Online Jadwal Rencana Studi Plus). OJRS+ (Online Jadwal Rencana Studi Plus) pada STMIK Raharja sendiri inipun merupakan suatu fasilitas yang tidak hanya diperuntukan bagi para Mahasiswa dalam melakukan batal tambah secara online saja, tetapi juga terdapat fasilitas untuk para Kepala Jurusan (Kajur), Dosen dan juga stuff pada STMIK Raharja. Didalam OJRS+ terdapat beberapa kendala, diantaranya sulit dalam melakukan login. Diperlukannya suatu sistem yang dapat mempermudah dalam melakukan login tanpa pengguna harus memasukan username dan juga password untuk mengatasi masalah tersebut. Dan juga untuk menjaga keamanan data pengguna akan lebih terjamin, karena hanya menggunakan tempat penyimpanan data pengguna secara terpusat. Maka dari itu dibuatlah system Single Sign On (SSO) pada OJRS+. Pengguna hanya perlu memasukan email atau yang biasa disebut Rinfo sekali untuk mendapatkan izin dan akses kesemua layanan yang terdapat dalam jaringan STMIK Raharja. Dengan merumuskan penggunaan System Single Sign On (SSO) pada login OJRS+ hal ini dapat memungkinkan dengan menggunakan metode yang berbasis YII untuk pencapaian sebuah masalah. Penelitian ini diharapkan dapat memudahkan dan memberi keamanan bagi pengguna dalam menggunakan OJRS+. Kata kunci : OJRS+, SSO, login As the development of the times and also the technology more quickly, the College campus is Raharja utilizing the internet as a network of communication between Professors and students to academic interests. College Raharja is currently working on research in built development continuously. In College there was a website that Raharja specifically intended to do cancel add online, the website is OJRS + (Online study plan Schedule Plus). OJRS + (Online study plan Schedule Plus) on the program's own Raharja STMIK is a facility that is not only intended for the students in doing the Cancel add online only, but there are also facilities for the heads of Departments (Kajur), lecturer and also stuff on STMIK Raharja. In OJRS + there are several constraints, including difficult in doing login. It needs a system that can make in doing login without the user having to enter your username and password in order to also resolve the issue. And also to maintain the safety of the data the user will be more secure, because it only uses data storage is centralized. Thus a single system for Single Sign On (SSO) in OJRS +. Users only need to enter the email or commonly called Rinfo once to get permission and access all of the services contained in the network STMIK Raharja. With the use of the System to formulate Single Sign On (SSO) login on OJRS + this can allow using YII-based methods for the achievement of a problem. This research is expected to facilitate and provide security for users using OJRS+ Keywords : OJRS+, SSO, login
APA, Harvard, Vancouver, ISO, and other styles
44

Riadi, Imam, Herman Herman, and Aulyah Zakilah Ifani. "Prototype Pengembangan Aplikasi Login menggunakan Teknologi Blockchain." Journal of Applied Informatics and Computing 5, no. 1 (February 7, 2021): 1–8. http://dx.doi.org/10.30871/jaic.v5i1.2411.

Full text
Abstract:
Internet berkembang dengan sangat pesat, dari berbagai jenis teknologi internet menjadi suatu hal yang menjadi kebutuhan setiap penggunanya. Kebutuhan informasi dan sistem jaringan yang luas memberikan kemudahan dalam mengaksesnya. Wireless salah satunya, wireless sangat membantu para pengguna internet. Akan tetapi, permasalahan yang sering muncul terletak pada pengamanan jaringan wireless. Banyak serangan yang membuat username dan password dari pengguna mudah saja di bobol. Berdasarkan permasalahan tersebut penelitian ini berfokus pada pengamanan saat pengguna login menggunakan sebuah perangkat. Salah satu teknologi inovasi yang mampu menyelesaikan permasalahan tersebut adalah Teknologi Blockchain. Dengan menggunakan teknologi Blockchain peretas akan sulit mengubah dan memodifikasi data yang sama disemua komputer di saat yang sama karena membutuhkan waktu yang sangat lama untuk memecahlan kode enkripsi pada setiap blok data di seluruh jaringan komputer.
APA, Harvard, Vancouver, ISO, and other styles
45

Pardi, S., E. Calloni, R. De Rosa, F. Garufi, L. Milano, and G. Russo. "A login shell interface for INFN-GRID." Journal of Physics: Conference Series 119, no. 6 (December 1, 2008): 062050. http://dx.doi.org/10.1088/1742-6596/119/6/062050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Kobie, Nicole. "Brainwave login fails if you're tipsy… hick." New Scientist 233, no. 3110 (January 2017): 14. http://dx.doi.org/10.1016/s0262-4079(17)30162-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Arvin S. Lat, Joshua, Rod Xavier R. Bondoc, and Kevin Charles V. Atienza. "SOUL System: secure online USB login system." Information Management & Computer Security 21, no. 2 (June 7, 2013): 102–9. http://dx.doi.org/10.1108/imcs-08-2012-0042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hwang, M. S. "Cryptanalysis of a remote login authentication scheme." Computer Communications 22, no. 8 (May 1999): 742–44. http://dx.doi.org/10.1016/s0140-3664(99)00036-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ali, Amir, and Eka Wilda Faida. "PENERAPAN ALGORITMA MESSAGE DIGGEST ALGORITHM 5 PADA LOGIN SISTEM INFORMASI MANAGEMEN RUMAH SAKIT." JOUTICA 7, no. 2 (September 15, 2022): 586. http://dx.doi.org/10.30736/informatika.v7i2.867.

Full text
Abstract:
Aplikasi SIMRS (Sistem Informasi Managemen Informasi Rumah Sakit) belum menerapkan proses enkripsi akun untuk masing-masing pengguna di masing-masing unit kerja. Hal ini terjadi karena aplikasi SIMRS belum difasilitasi dengan kemampuan enkripsi akun untuk tiap pengguna. Hal ini didukung dengan hasil survey awal dengan survey kuesioner kepada petugas kesehatan pengguna SIMRS di Rumah Sakit Surabaya Medical Service dimana sebanyak 66,7 % mengatakan belum ada metode khusus dalam login ke aplikasi SIMRS dan sebanyak 77,8 % mengatakan perlu diberikan metode khusus terhadap penggunaan username dan passwordnya. Tujuan dari penelitian ini adalah mengenkripsi password pada modul login pengguna dengan menggunakan algoritma MD5. Metode yang digunakan yaitu Algoritma MD5. Hasil dari penelitian ini adalah melakukan pengubahan pada tabel login pengguna untuk kolom password dengan function MD5 di databasenya dan penambahan pembacaan function MD5 pada codingan querynya. Kesimpulan dari penelitian ini adalah proses enkripsi dengan algoritma MD5 dapat diterapkan dalam pengamanan password pada aplikasi SIMRS
APA, Harvard, Vancouver, ISO, and other styles
50

He, Yi Hui. "Research on the Network Security and Identity Authentication Technology." Advanced Materials Research 926-930 (May 2014): 2819–22. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2819.

Full text
Abstract:
Network security and identity authentication is confirmed the true identity whether the user and the claimed identity is consistent or not, in order to prevent the illegal user access the system for resources by identity fraud. The one-time password authentication technology with high safety, convenient for using, easy for management and lower cost is applied widely and has bright prospection. The one-time password authentication technology support to add uncertain factors in the login process, so that the login authentication informations are not the same each time. It is useful to improve the security of the login process. In this paper, a new system which is based on the the one-time password authentication technology called biometric system is first introduced. Then the framework of multi-biometric system is presented, and several examples are also shown. The prospect about multi-biometric fusion is also given.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography