期刊文献+
共找到153篇文章
< 1 2 8 >
每页显示 20 50 100
Practical Encrypted Key Agreement Using Passwords
1
作者 WU Shuhua ZHU Yuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1625-1628,共4页
We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does no... We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does not need to carry smart card storing his private information but just needs to know his identity and password. For this purpose, the scheme was implemented over elliptic curves because of their well-known advantages with regard to processing and size constraints. Furthermore, the scheme is provably secure under the assumptions that the hash function closely behaves like a random oracle and that the elliptic curve computational Diffie-Hellman problem is difficult. 展开更多
关键词 PASSWORD encrypted key exchange Diffie-Hellman assumptions
下载PDF
Secure Passwords Using Combinatorial Group Theory
2
作者 Gilbert Baumslag Benjamin Fine +1 位作者 Anja Moldenhauer Gerhard Rosenberger 《Journal of Information Security》 2018年第2期154-167,共14页
Password security is a crucial component of modern internet security. In this paper, we present a provably secure method for password verification using combinatorial group theory. This method relies on the group rand... Password security is a crucial component of modern internet security. In this paper, we present a provably secure method for password verification using combinatorial group theory. This method relies on the group randomizer system, a subset of the MAGNUS computer algebra system and corrects most of the present problems with challenge response systems, the most common types of password verification. Theoretical security of the considered method depends on several results in asymptotic group theory. We mention further that this method has applications for many other password situations including container security. 展开更多
关键词 PASSWORD SECURITY Combinatorial GROUP Theory Free GROUP CRYPTOGRAPHY GROUP Randomizer System
下载PDF
Passwords Management via Split-Key
3
作者 Kenneth Giuliani V. Kumar Murty Guangwu Xu 《Journal of Information Security》 2016年第3期206-214,共9页
This paper proposes a scheme for password management by storing password encryptions on a server. The method involves having the encryption key split into a share for the user and one for the server. The user’s share... This paper proposes a scheme for password management by storing password encryptions on a server. The method involves having the encryption key split into a share for the user and one for the server. The user’s share shall be based solely on a selected passphrase. The server’s share shall be generated from the user’s share and the encryption key. The security and trust are achieved by performing both encryption and decryption on the client side. We also address the issue of countering dictionary attack by providing a further enhancement of the scheme. 展开更多
关键词 Password Encryption Password Storage Identity Management Secret Sharing
下载PDF
Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection
4
作者 S.Soundararajan B.R.Tapas Bapu +3 位作者 C.Kotteeswaran S.Venkatasubramanian P.J.Sathish Kumar Ahmed Mudassar Ali 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1227-1240,共14页
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,abse... Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,absence of physical protectivity,and accumulated traffic,WSN is highly vulner-able to security concerns.Therefore,this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis.It is challenging to determine if packet loss is caused by a collision in the medium access path,poor channel quality,or a selective forwarding assault.Identifying misbehaving nodes at the earliest opportunity is an acceptable solution for performing secure routing in such networks.As a result,in this study effort,we present a unique Modified Ad Hoc On-Demand Distance Vector(AODV)Routing protocol depending upon the One time password(OTP)method that employs the RSA algorithm.Finally,a trust evaluation process determines which approach is the most optimal.Accord-ing to the simulationfindings of the suggested routing protocol and comparison with existing routing protocols provided in this article,the proposed work is both efficient and cost-effective. 展开更多
关键词 Wireless sensor network selective forward attack one time password trust evaluation RSA algorithm
下载PDF
分选式流式细胞仪BD FACSAriaⅢ遇到的问题及解决方案 被引量:1
5
作者 张立霞 倪艳波 +1 位作者 王秀文 宋鹏 《医疗卫生装备》 CAS 2015年第2期151-151,153,共2页
0引言BD公司的分选式流式细胞仪BD FACSAriaⅢ是目前投入中国市场较新的一款,与其前款BD FACSAriaⅡ有部分差别,在使用过程中出现了几个问题。现将分选式流式细胞仪BD FACSAriaⅢ在使用过程中出现的几个问题及其解决方案介绍如下。1开... 0引言BD公司的分选式流式细胞仪BD FACSAriaⅢ是目前投入中国市场较新的一款,与其前款BD FACSAriaⅡ有部分差别,在使用过程中出现了几个问题。现将分选式流式细胞仪BD FACSAriaⅢ在使用过程中出现的几个问题及其解决方案介绍如下。1开机时软件运行出现问题1.1正常状态双击BD软件图标"BD FACSAria soft ware"后进入登录对话框, 展开更多
关键词 流式细胞仪 BD FACSAria 方案介绍 PASSWORD 前款 聚集成团 咨询工程师 液流 实验过程 磷酸盐缓冲溶液
下载PDF
基于C/S构架动态口令身份认证系统的设计与实现 被引量:2
6
作者 齐兴斌 赵丽 张连华 《电力学报》 2013年第1期66-68,共3页
在一次性口令认证技术的基础上,利用单向散列函数MD5算法,采用口令序列的方式,建立了一个基于客户端/服务器端的一次口令登陆系统,实现了动态口令,也就是OTP。这样的方法在链路上以及服务器端都能有效保护密码的安全,还可以有效地防止... 在一次性口令认证技术的基础上,利用单向散列函数MD5算法,采用口令序列的方式,建立了一个基于客户端/服务器端的一次口令登陆系统,实现了动态口令,也就是OTP。这样的方法在链路上以及服务器端都能有效保护密码的安全,还可以有效地防止密码重用,恶意注册以及来自服务器端的攻击。 展开更多
关键词 口令认证 MD5 OTP(ONE TIME PASSWORD)
下载PDF
Cyber Security Awareness among Students and Faculty Members in a Sudanese College 被引量:1
7
作者 Mohammed Daffalla Elradi Altigani Abd alraheem Altigani Osman Idriss Abaker 《Electrical Science & Engineering》 2020年第2期24-28,共5页
In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of b... In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of being exploited is cyber security awareness.Not only having the adequate knowledge but how to utilize this knowledge to prevent cyber attacks.In this paper we conducted a survey that focuses on three vital security parameters,which are trust,passwords and defensive attitude respectively.The survey mainly aimed at assessing cyber security knowledge of 200 students and 100 faculty members in a Sudanese college and how secure these participants think they are according to their current cyber behaviour.56%of the participants are males and 44%are females.The results revealed that all participants were having fairly-low level of security awareness and their defensive attitude is considerably weak and doesn’t protect them either individually or at institutional-level.Nevertheless,faculty member showed better cyber security knowledge and skills by 8%higher than students.This study can be used to develop training approaches that bridge the security gaps depicted by the respondents of the survey questions manipulated in this study. 展开更多
关键词 Cyber security AWARENESS passwords STUDENTS Faculty members
下载PDF
TDX SYSTEM系统参数丢失后的恢复
8
作者 王卫 黄英 陈维平 《医疗卫生装备》 CAS 2003年第S2期114-114,共1页
关键词 系统参数 第三军医大学 重庆市 西南医院 血药浓度 给药方案 不良反应 检测仪 校正曲线 PASSWORD
下载PDF
AvoidPwd: A Mnemonic Password Generation Strategy Based on Keyboard Transformation
9
作者 Shunying Lyu Qian Yao Jianhua Song 《China Communications》 SCIE CSCD 2022年第10期92-101,共10页
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ... Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the primary method in the future due to their simplicity and low cost.Considering the security and usability of passwords,we propose AvoidPwd,which is a novel mnemonic password generation strategy that is based on keyboard transformation.AvoidPwd helps users customize a“route”to bypass an“obstacle”and choose the characters on the“route”as the final password.The“obstacle”is a certain word using any language and the keys adjacent to the“obstacle”are typed with the“Shift”key.A two-part experiment was conducted to examine the memorability and security of the AvoidPwd strategy with other three password strategies and three leaked password sets.The results showed that the passwords generated by the AvoidPwd strategy were more secure than the other leaked password sets.Meanwhile,AvoidPwd outperformed the KbCg,SpIns,and Alphapwd in balancing security and usability.In addition,there are more symbols in the character distribution of AvoidPwd than the other strategies.AvoidPwd is hopeful to solve the security problem that people are difficult to remember symbols and they tend to input letters and digits when creating passwords. 展开更多
关键词 password generation strategy password security mnemonic passwords
下载PDF
CMOS中PASSWORD的清除
10
作者 刘辉 吴赟 《微机发展》 1996年第2期14-15,共2页
本文介绍微机CMOS被加锁后的几种解锁方法
关键词 CMOS存储器 存储器 PASSWORD CMOS
下载PDF
一次性密码验证系统 被引量:1
11
作者 王曦 史闻博 苗放 《物探化探计算技术》 CAS CSCD 2007年第2期177-181,90,共5页
简单介绍一次性密码系统机理,并与现有密码机制进行比较。一次性密码体现出诸多优势,其算法设计灵活、复杂度适中、计算量较小且安全性较高,这里给出了应用该算法设计的登陆系统的实现和工作原理。实践应用证明,该算法的登陆系统应用灵... 简单介绍一次性密码系统机理,并与现有密码机制进行比较。一次性密码体现出诸多优势,其算法设计灵活、复杂度适中、计算量较小且安全性较高,这里给出了应用该算法设计的登陆系统的实现和工作原理。实践应用证明,该算法的登陆系统应用灵活性强,系统资源消耗小,这均表明该算法的高性能及高可用性。 展开更多
关键词 OPA(One-time PASSWORD Algorithms) 一次性密码系统 PAM 安全 攻击
下载PDF
Internet上的医学杂志网址 被引量:2
12
作者 赵坤 张问德 《医学信息学杂志》 CAS 1999年第2期7-9,共3页
随着信息技术的飞速发展,Internet对社会各个方面都产生了前所未有的影响,医学方面也不例外。特别是许多专业医学期刊都在网上发布期刊电子版,电子版期刊一般都比原版期刊早出版1~2个月,提高了期刊利用的时效性,而且阅读费用低廉,这引... 随着信息技术的飞速发展,Internet对社会各个方面都产生了前所未有的影响,医学方面也不例外。特别是许多专业医学期刊都在网上发布期刊电子版,电子版期刊一般都比原版期刊早出版1~2个月,提高了期刊利用的时效性,而且阅读费用低廉,这引起了许多医学工作者的关心和兴趣。 展开更多
关键词 INTERNE 英国医学杂志 网址 医学期刊 期刊利用 电子版期刊 信息技术 航空航天医学 PASSWORD 原版期刊
下载PDF
基于WEB应用的安全通道技术的研究及原型的实现
13
作者 黄浩东 蒋凡 《计算机工程与应用》 CSCD 北大核心 2003年第9期179-181,共3页
内外网的安全通信是许多WEB应用程序的关键,该文提出一种在防火墙隔断的内外网之间建立基于WEB的数据安全通道的方法,并且在这条安全通道中设计了访问控制机制,解决了内外网之间WEB应用的安全问题。
关键词 安全通道SSL(Secure Socket Layer) OPIE(One Time PASSWORD in Everything) HMAC(Keyed HASH MESSAGE AUTHENTICATION Code)
下载PDF
Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card 被引量:3
14
作者 Jaewook Jung Donghoon Lee +1 位作者 Hakjun Lee Dongho Won 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第1期45-49,共5页
Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recent... Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recently, Liu et al. proposed an efficient and secure smart card based password authentication scheme. However, we find that Liu et al.’s scheme is vulnerable to the off-line password guessing attack and user impersonation attack. Furthermore, it also cannot provide user anonymity. In this paper, we cryptanalyze Liu et al.’s scheme and propose a security enhanced user authentication scheme to overcome the aforementioned problems. Especially, in order to preserve the user anonymity and prevent the guessing attack, we use the dynamic identity technique. The analysis shows that the proposed scheme is more secure and efficient than other related authentication schemes. 展开更多
关键词 AUTHENTICATION off-line password guessing attack smart card user anonymity
下载PDF
CM-Droid: Secure Container for Android Password Misuse Vulnerability 被引量:1
15
作者 Wen Zhang Keyue Li +2 位作者 Tianyang Li Shaozhang Niu Zhenguang Gao 《Computers, Materials & Continua》 SCIE EI 2019年第4期181-198,共18页
Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However... Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However,application developers do not have the knowledge of cryptography,thus the cryptographic algorithm may not be used correctly.As a result,security vulnerabilities are generated.Based on the previous studies,this paper summarizes the characteristics of password misuse vulnerability of Android application software,establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability.And on this basis,this paper designs and implements a secure container for Android application software password misuse vulnerability:CM-Droid. 展开更多
关键词 Password misuse evaluation model secure container dynamic repair
下载PDF
Password Pattern and Vulnerability Analysis for Web and Mobile Applications 被引量:1
16
作者 LI Shancang Imed Romdhani William Buchanan 《ZTE Communications》 2016年第B06期32-36,共5页
Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Sh... Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy and Minimum entropy. We show how to substantially improve upon the strength of passwords based on the analysis of text-password entropies. By analyzing the passwords datasets of Rockyou and 163.com, we believe strong password can be designed based on good usability, deployability, rememberbility, and security entropies. 展开更多
关键词 password strength security entropies password vulnerabilities
下载PDF
校园微型“阿里巴巴”创业服务交流平台研究
17
作者 郑以君 李华 +3 位作者 李陈陈 庞毅强 杨健 曾潇 《电脑迷》 2016年第4期179-180,共2页
在移动互联网时代,即时交易、1小时内送达商业圈成为电子商务新热点。针对高校校园特殊商业需求,本项目研究开发以校园为中心、校园周边一小时内送达的即时交易形式的校园微型'阿里巴巴'电子商务平台,研究新形势下的O2O电子商... 在移动互联网时代,即时交易、1小时内送达商业圈成为电子商务新热点。针对高校校园特殊商业需求,本项目研究开发以校园为中心、校园周边一小时内送达的即时交易形式的校园微型'阿里巴巴'电子商务平台,研究新形势下的O2O电子商务模式商业运作机制与企业管理。1前言本项目成员在2015年春季的课程设计中合作完成了校园电子商务需求调查,抽样调查发现校园内95.1%的同学具有网络购物经历,82. 展开更多
关键词 即时交易 商业需求 项目成员 商业圈 课程设计 实体店 营销对象 平台服务 线下 PASSWORD
下载PDF
Norton Utilities8.0中Password的解除
18
作者 曲得双 彭卉 《黑龙江水利科技》 1996年第3期95-97,共3页
NortonUtilities8.0中Password的解除曲得双,彭卉(黑龙江省水利水电勘测设计研究院)[关键词]Password,偏异量,异或运算,解除NortonUtilities是由Norton公司推出的功能... NortonUtilities8.0中Password的解除曲得双,彭卉(黑龙江省水利水电勘测设计研究院)[关键词]Password,偏异量,异或运算,解除NortonUtilities是由Norton公司推出的功能强大的实用工具组。它能够进行数据恢... 展开更多
关键词 PASSWORD 偏异量 异或运算 解除
下载PDF
2018世界“最烂密码”出炉 被引量:1
19
《发明与创新(初中生)》 2018年第12期36-36,共1页
据环球网报道,美国安全软件公司飞溅数据(SplashData)近日公布了2018年“最烂密码”报告。数字组合“123456”连续五年蝉联第一,第2到10名的“最烂密码”分别是password、123456789、12345678、12345、111111、1234567、Sunshine、qwert... 据环球网报道,美国安全软件公司飞溅数据(SplashData)近日公布了2018年“最烂密码”报告。数字组合“123456”连续五年蝉联第一,第2到10名的“最烂密码”分别是password、123456789、12345678、12345、111111、1234567、Sunshine、qwerty、iloveyou。 展开更多
关键词 密码 PASSWORD 世界 软件公司 数字组合 环球网
下载PDF
基于RESTful以及Salted Password Hashing算法的模拟试衣间系统 被引量:1
20
作者 夏禹 《现代信息科技》 2019年第11期196-198,共3页
本文主要从系统设计、功能实现、整体架构的角度介绍了基于B/S模式下的模拟试衣间系统。本文还着重地介绍了Salted Password Hashing加密算法与传统的哈希函数加密算法之间存在的区别与联系,Salted Password Hashing加密算法在传统的软... 本文主要从系统设计、功能实现、整体架构的角度介绍了基于B/S模式下的模拟试衣间系统。本文还着重地介绍了Salted Password Hashing加密算法与传统的哈希函数加密算法之间存在的区别与联系,Salted Password Hashing加密算法在传统的软件系统中能够发挥重要作用,以及RESTful架构下软件系统的使用设计、实现方案及REST设计规范为实际软件编程带来的便利。 展开更多
关键词 模拟试衣间系统 RESTFUL 前后端分离 Salted PASSWORD HASHING
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部