Chakraborty et al., 2024 - Google Patents
A Study on Password Protection and Encryption in the era of Cyber AttacksChakraborty et al., 2024
- Document ID
- 12811574660024039102
- Author
- Chakraborty S
- Jackson C
- Frazier M
- Clark K
- Publication year
- Publication venue
- SoutheastCon 2024
External Links
Snippet
This project seeks to explore and understand how passwords work currently and how to create strong passwords to protect the user's personal data. That research will be used to design a program that will generate a password for users using random characters …
- 238000011160 research 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang-Kennedy et al. | Revisiting password rules: facilitating human management of passwords | |
US20180262503A1 (en) | User-generated session passcode for re-authentication | |
CN100416446C (en) | Method and system for detecting attacks on protected computer resources | |
Kakarla et al. | A real-world password cracking demonstration using open source tools for instructional use | |
Chakraborty et al. | A Study on Password Protection and Encryption in the era of Cyber Attacks | |
Pagar et al. | Strengthening password security through honeyword and Honeyencryption technique | |
Kharod et al. | An improved hashing based password security scheme using salting and differential masking | |
Natho et al. | Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm | |
Adamu et al. | A three-step one-time password, textual and recall-based graphical password for an online authentication | |
Mandlekar et al. | Survey on fog computing mitigating data theft attacks in cloud | |
Gabor et al. | Security issues related to e-learning education | |
Boonkrong | Security of passwords | |
Khande et al. | An effective mechanism for securing and managing password using AES-256 encryption & PBKDF2 | |
Gupta et al. | Implementing high grade security in cloud application using multifactor authentication and cryptography | |
Zaidi et al. | Exploring the landscape of password managers for individual users through innovative solution | |
AlMuhanna et al. | Enhanced system for securing password manager using honey encryption | |
Erike et al. | Dynamic User-Dependent Technique for Robust Multi-Password Generation Against Offline Cracking Attacks | |
Sabev et al. | Android password managers and vault applications: comparative security analysis | |
Curran et al. | Good Practice for Strong Passwords | |
Komakula et al. | Honey Encryption With Quantum Key Distribution | |
Gill et al. | Enhancing Cloud Data Security using Artificial Neural Networks for Users’ Account Hijacking Security Threats | |
Cisar et al. | Password-a form of authentication | |
Borde et al. | Overview of Web password hashing using salt techiques | |
Yisa et al. | A review of top open source password cracking tools | |
Maddox et al. | Modern password security for users |